www/chromium: update to 137.0.7151.55

Security:	https://vuxml.freebsd.org/freebsd/25acd603-3dde-11f0-8cb5-a8a1599412c6.html
This commit is contained in:
Robert Nagy 2025-05-31 07:14:59 +02:00
parent fc8715cd2d
commit 0b2d1e127d
361 changed files with 1657 additions and 2492 deletions

View file

@ -1,6 +1,5 @@
PORTNAME= chromium
PORTVERSION= 136.0.7103.113
PORTREVISION= 1
PORTVERSION= 137.0.7151.55
PULSEMV= 16
PULSEV= ${PULSEMV}.1
CATEGORIES= www wayland
@ -92,8 +91,7 @@ SHEBANG_FILES= chrome/tools/build/linux/chrome-wrapper #buildtools/linux64/clang
MAKE_ARGS= -C out/${BUILDTYPE}
ALL_TARGET= chrome
BINARY_ALIAS= python3=${PYTHON_CMD} \
moc=${PREFIX}/bin/moc-qt5
BINARY_ALIAS= python3=${PYTHON_CMD}
# TODO bz@ : install libwidevinecdm.so (see third_party/widevine/cdm/BUILD.gn)
#
@ -110,6 +108,7 @@ GN_ARGS+= clang_use_chrome_plugins=false \
fatal_linker_warnings=false \
icu_use_data_file=false \
is_clang=true \
moc_qt5_path="${QT_TOOLDIR}/moc" \
optimize_webui=true \
toolkit_views=true \
treat_warnings_as_errors=false \
@ -120,6 +119,7 @@ GN_ARGS+= clang_use_chrome_plugins=false \
use_lld=true \
use_partition_alloc=true \
use_partition_alloc_as_malloc=false \
use_qt5=true \
use_sysroot=false \
use_system_freetype=false \
use_system_harfbuzz=true \

View file

@ -1,7 +1,7 @@
TIMESTAMP = 1747298146
SHA256 (chromium-136.0.7103.113.tar.xz) = 7c765bd13df842a28bb52279b8d711411ac6082151473e07bd70b9a482c0a0ac
SIZE (chromium-136.0.7103.113.tar.xz) = 7196537592
TIMESTAMP = 1748448949
SHA256 (chromium-137.0.7151.55.tar.xz) = b11e76fd82745db5602ce151ae931cc5e56c3ee2b6e08c2fbf788bf4b3ea84cb
SIZE (chromium-137.0.7151.55.tar.xz) = 7246424332
SHA256 (pulseaudio-16.1.tar.gz) = 027266c62f2a84422ac45fa721a649508f0f1628fb1fd9242315ac54ce2d7c92
SIZE (pulseaudio-16.1.tar.gz) = 2763111
SHA256 (chromium-136.0.7103.113-testdata.tar.xz) = cbf264643986db5b7aa91843ea64a1b9e23d00bb226b234d4f60788469a58ef8
SIZE (chromium-136.0.7103.113-testdata.tar.xz) = 651614116
SHA256 (chromium-137.0.7151.55-testdata.tar.xz) = f5c2c8483cc4608d3b1eb980cc81d74ae3840f6400f4ce39727cb309fe5378f5
SIZE (chromium-137.0.7151.55-testdata.tar.xz) = 656595876

View file

@ -1,4 +1,4 @@
--- BUILD.gn.orig 2025-05-05 10:57:53 UTC
--- BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ BUILD.gn
@@ -71,7 +71,7 @@ declare_args() {
root_extra_deps = []
@ -87,7 +87,7 @@
# Using the default toolchain for this tool, as it's run during tests not
# during the build. This places a symlink in the root_build_dir for scrips
# to use.
@@ -1760,7 +1768,7 @@ group("chromium_builder_perf") {
@@ -1743,7 +1751,7 @@ group("chromium_builder_perf") {
data_deps += [ "//chrome/test:performance_browser_tests" ]
}

View file

@ -1,6 +1,6 @@
--- base/BUILD.gn.orig 2025-05-05 10:57:53 UTC
--- base/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ base/BUILD.gn
@@ -1104,11 +1104,26 @@ component("base") {
@@ -1108,11 +1108,26 @@ component("base") {
# Needed for <atomic> if using newer C++ library than sysroot, except if
# building inside the cros_sdk environment - use host_toolchain as a
# more robust check for this.
@ -28,7 +28,7 @@
if (use_allocator_shim) {
if (is_apple) {
sources += [ "allocator/early_zone_registration_apple.h" ]
@@ -1128,7 +1143,7 @@ component("base") {
@@ -1132,7 +1147,7 @@ component("base") {
# Allow more direct string conversions on platforms with native utf8
# strings
@ -37,7 +37,7 @@
defines += [ "SYSTEM_NATIVE_UTF8" ]
}
@@ -2152,6 +2167,22 @@ component("base") {
@@ -2166,6 +2181,22 @@ component("base") {
]
}
@ -60,7 +60,7 @@
# iOS
if (is_ios) {
sources += [
@@ -2312,6 +2343,33 @@ component("base") {
@@ -2334,6 +2365,33 @@ component("base") {
}
}
@ -94,7 +94,7 @@
if (use_blink) {
sources += [
"files/file_path_watcher.cc",
@@ -2690,7 +2748,7 @@ buildflag_header("protected_memory_buildflags") {
@@ -2729,7 +2787,7 @@ buildflag_header("protected_memory_buildflags") {
header = "protected_memory_buildflags.h"
header_dir = "base/memory"
@ -103,7 +103,7 @@
(is_win || is_linux || is_android || is_mac)
flags = [ "PROTECTED_MEMORY_ENABLED=$protected_memory_enabled" ]
@@ -3163,7 +3221,7 @@ if (is_apple) {
@@ -3236,7 +3294,7 @@ if (is_apple) {
}
}
@ -112,7 +112,7 @@
# This test must compile with -fstack-protector-all
source_set("stack_canary_linux_unittests") {
testonly = true
@@ -3851,7 +3909,7 @@ test("base_unittests") {
@@ -3924,7 +3982,7 @@ test("base_unittests") {
]
}
@ -121,7 +121,7 @@
sources += [
"debug/proc_maps_linux_unittest.cc",
"files/scoped_file_linux_unittest.cc",
@@ -3879,7 +3937,7 @@ test("base_unittests") {
@@ -3952,7 +4010,7 @@ test("base_unittests") {
"posix/file_descriptor_shuffle_unittest.cc",
"posix/unix_domain_socket_unittest.cc",
]
@ -130,7 +130,7 @@
sources += [
"profiler/stack_base_address_posix_unittest.cc",
"profiler/stack_copier_signal_unittest.cc",
@@ -3890,7 +3948,7 @@ test("base_unittests") {
@@ -3963,7 +4021,7 @@ test("base_unittests") {
# Allow more direct string conversions on platforms with native utf8
# strings
@ -139,7 +139,7 @@
defines += [ "SYSTEM_NATIVE_UTF8" ]
}
@@ -4080,7 +4138,7 @@ test("base_unittests") {
@@ -4151,7 +4209,7 @@ test("base_unittests") {
deps += [ ":base_profiler_test_support_library" ]
}

View file

@ -0,0 +1,11 @@
--- base/allocator/partition_alloc_features.cc.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_alloc_features.cc
@@ -164,7 +164,7 @@ BASE_FEATURE(kPartitionAllocEventuallyZeroFreedMemory,
// disabled elsewhere (for now). Does not apply to Windows.
BASE_FEATURE(kPartitionAllocFewerMemoryRegions,
"PartitionAllocFewerMemoryRegions",
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_BSD)
FEATURE_ENABLED_BY_DEFAULT);
#else
FEATURE_DISABLED_BY_DEFAULT);

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/partition_alloc.gni.orig 2025-05-05 10:57:53 UTC
--- base/allocator/partition_allocator/partition_alloc.gni.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/partition_alloc.gni
@@ -89,7 +89,7 @@ if (is_nacl) {
@@ -91,7 +91,7 @@ if (is_nacl) {
# TODO(crbug.com/329199197): Clean this up when experiments are complete.
use_large_empty_slot_span_ring = true
@ -9,7 +9,7 @@
!is_hwasan && (is_linux || is_android)
declare_args() {
@@ -348,7 +348,7 @@ declare_args() {
@@ -353,7 +353,7 @@ declare_args() {
declare_args() {
# Shadow metadata is still under development and only supports Linux
# for now.
@ -18,7 +18,7 @@
}
declare_args() {
@@ -491,7 +491,7 @@ assert(!use_asan_backup_ref_ptr || use_raw_ptr_hookabl
@@ -496,7 +496,7 @@ assert(!use_asan_backup_ref_ptr || use_raw_ptr_hookabl
# dependencies that use partition_allocator are compiled in AOSP against a
# version of glibc that does not include pkeys syscall numbers.
is_pkeys_available =

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/src/partition_alloc/BUILD.gn.orig 2025-05-05 10:57:53 UTC
--- base/allocator/partition_allocator/src/partition_alloc/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/src/partition_alloc/BUILD.gn
@@ -886,7 +886,7 @@ if (is_clang_or_gcc) {
@@ -893,7 +893,7 @@ if (is_clang_or_gcc) {
configs -= [ partition_alloc_enable_arc_config ]
}
}

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/src/partition_alloc/page_allocator_internals_posix.h.orig 2025-04-04 08:52:13 UTC
--- base/allocator/partition_allocator/src/partition_alloc/page_allocator_internals_posix.h.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/src/partition_alloc/page_allocator_internals_posix.h
@@ -309,8 +309,12 @@ bool TryRecommitSystemPagesInternal(
@@ -317,8 +317,12 @@ bool TryRecommitSystemPagesInternal(
void DiscardSystemPagesInternal(uintptr_t address, size_t length) {
void* ptr = reinterpret_cast<void*>(address);

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/src/partition_alloc/partition_alloc_constants.h.orig 2025-03-05 08:14:56 UTC
--- base/allocator/partition_allocator/src/partition_alloc/partition_alloc_constants.h.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/src/partition_alloc/partition_alloc_constants.h
@@ -327,7 +327,7 @@ PA_DEFINE_OPERATORS_FOR_FLAGS(PoolHandleMask);
@@ -312,7 +312,7 @@ PA_DEFINE_OPERATORS_FOR_FLAGS(PoolHandleMask);
// 8GB for each of the glued pools).
#if PA_BUILDFLAG(HAS_64_BIT_POINTERS)
#if PA_BUILDFLAG(IS_ANDROID) || PA_BUILDFLAG(IS_IOS) || \
@ -9,7 +9,7 @@
constexpr size_t kPoolMaxSize = 8 * kGiB;
#else
constexpr size_t kPoolMaxSize = 16 * kGiB;
@@ -444,7 +444,7 @@ PA_ALWAYS_INLINE constexpr size_t MaxDirectMapped() {
@@ -429,7 +429,7 @@ PA_ALWAYS_INLINE constexpr size_t MaxDirectMapped() {
// TODO(casey.smalley@arm.com): under 64k pages we can end up in a situation
// where a normal slot span will be large enough to contain multiple items,
// but the address will go over the final partition page after being aligned.

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/src/partition_alloc/partition_root.cc.orig 2025-02-19 07:43:18 UTC
--- base/allocator/partition_allocator/src/partition_alloc/partition_root.cc.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/src/partition_alloc/partition_root.cc
@@ -44,7 +44,7 @@
@@ -45,7 +45,7 @@
#include "wow64apiset.h"
#endif
@ -9,7 +9,7 @@
#include <pthread.h>
#if PA_CONFIG(ENABLE_SHADOW_METADATA)
#include <sys/mman.h>
@@ -297,7 +297,7 @@ void PartitionAllocMallocInitOnce() {
@@ -298,7 +298,7 @@ void PartitionAllocMallocInitOnce() {
return;
}
@ -18,7 +18,7 @@
// When fork() is called, only the current thread continues to execute in the
// child process. If the lock is held, but *not* by this thread when fork() is
// called, we have a deadlock.
@@ -1117,7 +1117,7 @@ void PartitionRoot::Init(PartitionOptions opts) {
@@ -1118,7 +1118,7 @@ void PartitionRoot::Init(PartitionOptions opts) {
// apple OSes.
PA_CHECK((internal::SystemPageSize() == (size_t{1} << 12)) ||
(internal::SystemPageSize() == (size_t{1} << 14)));

View file

@ -1,6 +1,6 @@
--- base/allocator/partition_allocator/src/partition_alloc/spinning_mutex.cc.orig 2024-08-26 12:06:38 UTC
--- base/allocator/partition_allocator/src/partition_alloc/spinning_mutex.cc.orig 2025-05-28 14:55:43 UTC
+++ base/allocator/partition_allocator/src/partition_alloc/spinning_mutex.cc
@@ -17,7 +17,16 @@
@@ -19,7 +19,16 @@
#endif
#if PA_CONFIG(HAS_LINUX_KERNEL)
@ -17,37 +17,20 @@
#include <sys/syscall.h>
#include <unistd.h>
@@ -106,8 +115,16 @@ void SpinningMutex::FutexWait() {
// |kLockedContended| anymore. Note that even without spurious wakeups, the
// value of |state_| is not guaranteed when this returns, as another thread
// may get the lock before we get to run.
+#if defined(OS_FREEBSD)
+ int err = _umtx_op(&state_, UMTX_OP_WAIT_UINT_PRIVATE,
+ kLockedContended, nullptr, nullptr);
+#elif defined(OS_OPENBSD)
+ int err = futex(reinterpret_cast<volatile unsigned int *>(&state_), FUTEX_WAIT | FUTEX_PRIVATE_FLAG,
+ kLockedContended, nullptr, nullptr);
+#else
int err = syscall(SYS_futex, &state_, FUTEX_WAIT | FUTEX_PRIVATE_FLAG,
kLockedContended, nullptr, nullptr, 0);
+#endif
if (err) {
// These are programming error, check them.
@@ -119,8 +136,16 @@ void SpinningMutex::FutexWait() {
void SpinningMutex::FutexWake() {
@@ -92,8 +101,16 @@ PA_ALWAYS_INLINE long FutexSyscall(volatile void* ftx,
int saved_errno = errno;
errno = 0;
+#if defined(OS_FREEBSD)
+ long retval = _umtx_op(&state_, UMTX_OP_WAKE_PRIVATE,
+ 1 /* wake up a single waiter */, nullptr, nullptr);
+ long retval = _umtx_op(&state_, UMTX_OP_WAIT_UINT_PRIVATE,
+ kLockedContended, nullptr, nullptr);
+#elif defined(OS_OPENBSD)
+ long retval = futex(reinterpret_cast<volatile unsigned int *>(&state_), FUTEX_WAKE | FUTEX_PRIVATE_FLAG,
+ 1 /* wake up a single waiter */, nullptr, nullptr);
+ long retval = futex(reinterpret_cast<volatile unsigned int *>(&state_), FUTEX_WAIT | FUTEX_PRIVATE_FLAG,
+ kLockedContended, nullptr, nullptr);
+#else
long retval = syscall(SYS_futex, &state_, FUTEX_WAKE | FUTEX_PRIVATE_FLAG,
1 /* wake up a single waiter */, nullptr, nullptr, 0);
long retval = syscall(SYS_futex, ftx, op | FUTEX_PRIVATE_FLAG, value, nullptr,
nullptr, 0);
+#endif
PA_CHECK(retval != -1);
errno = saved_errno;
}
if (retval == -1) {
// These are programming errors, check them.
PA_DCHECK((errno != EPERM) || (errno != EACCES) || (errno != EINVAL) ||

View file

@ -1,6 +1,6 @@
--- base/debug/debugger_posix.cc.orig 2025-03-05 08:14:56 UTC
--- base/debug/debugger_posix.cc.orig 2025-05-28 14:55:43 UTC
+++ base/debug/debugger_posix.cc
@@ -41,6 +41,10 @@
@@ -42,6 +42,10 @@
#include <sys/sysctl.h>
#endif
@ -11,7 +11,7 @@
#if BUILDFLAG(IS_FREEBSD)
#include <sys/user.h>
#endif
@@ -99,33 +103,52 @@ bool BeingDebugged() {
@@ -100,33 +104,52 @@ bool BeingDebugged() {
// Caution: struct kinfo_proc is marked __APPLE_API_UNSTABLE. The source and
// binary interfaces may change.

View file

@ -1,4 +1,4 @@
--- base/files/drive_info.h.orig 2025-02-19 07:43:18 UTC
--- base/files/drive_info.h.orig 2025-05-28 14:55:43 UTC
+++ base/files/drive_info.h
@@ -48,7 +48,7 @@ struct BASE_EXPORT DriveInfo {
std::optional<bool> has_seek_penalty;
@ -6,6 +6,6 @@
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
- BUILDFLAG(IS_CHROMEOS)
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_BSD)
// Whether the drive is a removable drive.
// Whether the drive is a "removable" drive.
//
// Note on macOS: that SSDs that are connected over USB that you can eject
// In macOS's IOKit API, a drive is "removable" if "the media is removable

View file

@ -1,4 +1,4 @@
--- base/memory/platform_shared_memory_region.h.orig 2025-01-15 09:18:26 UTC
--- base/memory/platform_shared_memory_region.h.orig 2025-05-28 14:55:43 UTC
+++ base/memory/platform_shared_memory_region.h
@@ -18,7 +18,7 @@
#include "base/unguessable_token.h"
@ -27,3 +27,12 @@
,
bool executable = false
#endif
@@ -236,7 +236,7 @@ class BASE_EXPORT PlatformSharedMemoryRegion {
#if BUILDFLAG(IS_FUCHSIA)
kNotVmo,
#endif
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
kFcntlFailed,
kReadOnlyFdNotReadOnly,
kUnexpectedReadOnlyFd,

View file

@ -1,6 +1,6 @@
--- base/memory/platform_shared_memory_region_posix.cc.orig 2025-03-05 08:14:56 UTC
--- base/memory/platform_shared_memory_region_posix.cc.orig 2025-05-28 14:55:43 UTC
+++ base/memory/platform_shared_memory_region_posix.cc
@@ -55,7 +55,7 @@ bool CheckFDAccessMode(int fd, int expected_mode) {
@@ -61,7 +61,7 @@ std::optional<FDAccessModeError> CheckFDAccessMode(int
} // namespace
@ -9,7 +9,7 @@
// static
ScopedFD PlatformSharedMemoryRegion::ExecutableRegion::CreateFD(size_t size) {
PlatformSharedMemoryRegion region =
@@ -175,7 +175,7 @@ bool PlatformSharedMemoryRegion::ConvertToUnsafe() {
@@ -183,7 +183,7 @@ bool PlatformSharedMemoryRegion::ConvertToUnsafe() {
// static
PlatformSharedMemoryRegion PlatformSharedMemoryRegion::Create(Mode mode,
size_t size
@ -18,7 +18,7 @@
,
bool executable
#endif
@@ -204,7 +204,7 @@ PlatformSharedMemoryRegion PlatformSharedMemoryRegion:
@@ -212,7 +212,7 @@ PlatformSharedMemoryRegion PlatformSharedMemoryRegion:
// flag.
FilePath directory;
if (!GetShmemTempDir(

View file

@ -1,6 +1,6 @@
--- base/process/launch.h.orig 2024-11-14 07:57:23 UTC
--- base/process/launch.h.orig 2025-05-28 14:55:43 UTC
+++ base/process/launch.h
@@ -241,7 +241,7 @@ struct BASE_EXPORT LaunchOptions {
@@ -245,7 +245,7 @@ struct BASE_EXPORT LaunchOptions {
bool clear_environment = false;
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA)

View file

@ -1,6 +1,6 @@
--- base/strings/safe_sprintf_unittest.cc.orig 2025-03-05 08:14:56 UTC
--- base/strings/safe_sprintf_unittest.cc.orig 2025-05-28 14:55:43 UTC
+++ base/strings/safe_sprintf_unittest.cc
@@ -743,6 +743,7 @@ TEST(SafeSPrintfTest, EmbeddedNul) {
@@ -746,6 +746,7 @@ TEST(SafeSPrintfTest, EmbeddedNul) {
#endif
}
@ -8,7 +8,7 @@
TEST(SafeSPrintfTest, EmitNULL) {
char buf[40];
#if defined(__GNUC__)
@@ -759,6 +760,7 @@ TEST(SafeSPrintfTest, EmitNULL) {
@@ -762,6 +763,7 @@ TEST(SafeSPrintfTest, EmitNULL) {
#pragma GCC diagnostic pop
#endif
}

View file

@ -1,4 +1,4 @@
--- build/config/compiler/BUILD.gn.orig 2025-05-07 13:11:00 UTC
--- build/config/compiler/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ build/config/compiler/BUILD.gn
@@ -197,7 +197,7 @@ declare_args() {
# This greatly reduces the size of debug builds, at the cost of
@ -27,7 +27,7 @@
}
# compiler ---------------------------------------------------------------------
@@ -508,6 +511,10 @@ config("compiler") {
@@ -509,6 +512,10 @@ config("compiler") {
}
}
@ -38,7 +38,7 @@
# Linux-specific compiler flags setup.
# ------------------------------------
if (use_icf && (!is_apple || use_lld)) {
@@ -567,7 +574,7 @@ config("compiler") {
@@ -569,7 +576,7 @@ config("compiler") {
ldflags += [ "-Wl,-z,keep-text-section-prefix" ]
}
@ -47,7 +47,7 @@
cflags += [ "-fcrash-diagnostics-dir=" + clang_diagnostic_dir ]
if (save_reproducers_on_lld_crash && use_lld) {
ldflags += [
@@ -1212,7 +1219,7 @@ config("compiler_cpu_abi") {
@@ -1227,7 +1234,7 @@ config("compiler_cpu_abi") {
]
}
} else if (current_cpu == "arm") {
@ -56,7 +56,7 @@
cflags += [ "--target=arm-linux-gnueabihf" ]
ldflags += [ "--target=arm-linux-gnueabihf" ]
}
@@ -1227,7 +1234,7 @@ config("compiler_cpu_abi") {
@@ -1242,7 +1249,7 @@ config("compiler_cpu_abi") {
}
} else if (current_cpu == "arm64") {
if (is_clang && !is_android && !is_nacl && !is_fuchsia &&
@ -65,7 +65,7 @@
cflags += [ "--target=aarch64-linux-gnu" ]
ldflags += [ "--target=aarch64-linux-gnu" ]
}
@@ -1561,7 +1568,7 @@ config("compiler_deterministic") {
@@ -1576,7 +1583,7 @@ config("compiler_deterministic") {
# different build directory like "out/feature_a" and "out/feature_b" if
# we build same files with same compile flag.
# Other paths are already given in relative, no need to normalize them.
@ -74,16 +74,16 @@
# TODO(https://crbug.com/1231236): Use -ffile-compilation-dir= here.
cflags += [
"-Xclang",
@@ -1619,7 +1626,7 @@ config("compiler_deterministic") {
@@ -1634,7 +1641,7 @@ config("compiler_deterministic") {
}
config("clang_revision") {
- if (is_clang && clang_base_path == default_clang_base_path &&
+ if (is_clang && !is_bsd && clang_base_path == default_clang_base_path &&
current_os != "zos") {
update_args = [
"--print-revision",
@@ -1652,7 +1659,7 @@ config("clang_revision") {
_perform_consistency_checks = current_toolchain == default_toolchain
if (llvm_force_head_revision) {
@@ -1719,7 +1726,7 @@ config("clang_revision") {
# e.g. by setting in the the project's .gn file.
config("clang_warning_suppression") {
# Some build configs use older versions of clang that don't support WSMs
@ -92,7 +92,7 @@
!llvm_android_mainline && is_clang &&
clang_warning_suppression_file != "") {
from_build_root =
@@ -1985,9 +1992,6 @@ config("default_warnings") {
@@ -2053,9 +2060,6 @@ config("default_warnings") {
# TODO(crbug.com/40284799): Fix and re-enable.
"-Wno-thread-safety-reference-return",
@ -102,7 +102,7 @@
]
cflags_cc += [
@@ -2776,7 +2780,7 @@ config("afdo_optimize_size") {
@@ -2837,7 +2841,7 @@ config("afdo_optimize_size") {
# There are some targeted places that AFDO regresses, so we provide a separate
# config to allow AFDO to be disabled per-target.
config("afdo") {
@ -111,7 +111,7 @@
cflags = []
if (clang_emit_debug_info_for_profiling) {
# Add the following flags to generate debug info for profiling.
@@ -2803,7 +2807,7 @@ config("afdo") {
@@ -2864,7 +2868,7 @@ config("afdo") {
cflags += [ "-Wno-backend-plugin" ]
inputs = [ _clang_sample_profile ]
}
@ -120,7 +120,7 @@
cflags = [ "-fauto-profile=${auto_profile_path}" ]
inputs = [ auto_profile_path ]
}
@@ -2980,7 +2984,7 @@ config("symbols") {
@@ -3041,7 +3045,7 @@ config("symbols") {
cflags += [ "-gomit-unreferenced-methods" ]
}

View file

@ -1,6 +1,6 @@
--- build/config/rust.gni.orig 2025-05-05 10:57:53 UTC
--- build/config/rust.gni.orig 2025-05-28 14:55:43 UTC
+++ build/config/rust.gni
@@ -346,6 +346,10 @@ if (is_linux || is_chromeos) {
@@ -361,6 +361,10 @@ if (is_linux || is_chromeos) {
}
}

View file

@ -1,109 +0,0 @@
--- build/rust/allocator/BUILD.gn.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/BUILD.gn
@@ -0,0 +1,106 @@
+# Copyright 2025 The Chromium Authors
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+import("//build/buildflag_header.gni")
+import("//build/config/rust.gni")
+import("//build/rust/rust_static_library.gni")
+
+rust_allocator_uses_partition_alloc = false
+if (build_with_chromium) {
+ import("//base/allocator/partition_allocator/partition_alloc.gni")
+ rust_allocator_uses_partition_alloc = use_partition_alloc_as_malloc
+}
+
+# In ASAN builds, PartitionAlloc-Everywhere is disabled, meaning malloc() and
+# friends in C++ do not go to PartitionAlloc. So we also don't point the Rust
+# allocation functions at PartitionAlloc. Generally, this means we just direct
+# them to the Standard Library's allocator.
+#
+# However, on Windows the Standard Library uses HeapAlloc() and Windows ASAN
+# does *not* hook that method, so ASAN does not get to hear about allocations
+# made in Rust. To resolve this, we redirect allocation to _aligned_malloc
+# which Windows ASAN *does* hook.
+#
+# Note that there is a runtime option to make ASAN hook HeapAlloc() but
+# enabling it breaks Win32 APIs like CreateProcess:
+# https://crbug.com/368070343#comment29
+rust_allocator_uses_aligned_malloc = false
+if (!rust_allocator_uses_partition_alloc && is_win && is_asan) {
+ rust_allocator_uses_aligned_malloc = true
+}
+
+rust_allocator_uses_allocator_impls_h =
+ rust_allocator_uses_partition_alloc || rust_allocator_uses_aligned_malloc
+
+buildflag_header("buildflags") {
+ header = "buildflags.h"
+ flags = [
+ "RUST_ALLOCATOR_USES_PARTITION_ALLOC=$rust_allocator_uses_partition_alloc",
+ "RUST_ALLOCATOR_USES_ALIGNED_MALLOC=$rust_allocator_uses_aligned_malloc",
+ ]
+ visibility = [ ":*" ]
+}
+
+if (toolchain_has_rust) {
+ # All targets which depend on Rust code but are not linked by rustc must
+ # depend on this. Usually, this dependency will come from the rust_target() GN
+ # template. However, cargo_crate() does *not* include this dependency so any
+ # C++ targets which directly depend on a cargo_crate() must depend on this.
+ rust_static_library("allocator") {
+ sources = [ "lib.rs" ]
+ crate_root = "lib.rs"
+ cxx_bindings = [ "lib.rs" ]
+
+ deps = [ ":alloc_error_handler_impl" ]
+ if (rust_allocator_uses_allocator_impls_h) {
+ deps += [ ":allocator_impls" ]
+ }
+
+ no_chromium_prelude = true
+ no_allocator_crate = true
+ allow_unsafe = true
+
+ rustflags = []
+ if (rust_allocator_uses_allocator_impls_h) {
+ rustflags += [ "--cfg=rust_allocator_uses_allocator_impls_h" ]
+ cxx_bindings += [ "allocator_impls_ffi.rs" ]
+ sources += [ "allocator_impls_ffi.rs" ]
+ }
+
+ # TODO(https://crbug.com/410596442): Stop using unstable features here.
+ configs -= [ "//build/config/compiler:disallow_unstable_features" ]
+ }
+
+ if (rust_allocator_uses_allocator_impls_h) {
+ static_library("allocator_impls") {
+ public_deps = []
+ if (rust_allocator_uses_partition_alloc) {
+ public_deps +=
+ [ "//base/allocator/partition_allocator:partition_alloc" ]
+ }
+
+ sources = [
+ "allocator_impls.cc",
+ "allocator_impls.h",
+ ]
+ deps = [ ":buildflags" ]
+ visibility = [ ":*" ]
+ }
+ }
+
+ static_library("alloc_error_handler_impl") {
+ sources = [
+ # `alias.*`, `compiler_specific.h`, and `immediate_crash.*` have been
+ # copied from `//base`.
+ # TODO(crbug.com/40279749): Avoid duplication / reuse code.
+ "alias.cc",
+ "alias.h",
+ "alloc_error_handler_impl.cc",
+ "alloc_error_handler_impl.h",
+ "compiler_specific.h",
+ "immediate_crash.h",
+ ]
+ visibility = [ ":*" ]
+ }
+}

View file

@ -1,12 +0,0 @@
--- build/rust/allocator/DEPS.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/DEPS
@@ -0,0 +1,9 @@
+include_rules = [
+ "-base",
+]
+
+specific_include_rules = {
+ "allocator_impls.cc" : [
+ "+partition_alloc"
+ ]
+}

View file

@ -1,25 +0,0 @@
--- build/rust/allocator/alias.cc.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/alias.cc
@@ -0,0 +1,22 @@
+// Copyright 2023 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+// This file has been copied from //base/debug/alias.cc ( additionally the APIs
+// were moved into the `build_rust_std` namespace).
+//
+// TODO(crbug.com/40279749): Avoid code duplication / reuse code.
+
+#include "build/rust/allocator/alias.h"
+
+#include "build/rust/allocator/compiler_specific.h"
+
+namespace build_rust_std {
+namespace debug {
+
+// This file/function should be excluded from LTO/LTCG to ensure that the
+// compiler can't see this function's implementation when compiling calls to it.
+NOINLINE void Alias(const void* var) {}
+
+} // namespace debug
+} // namespace build_rust_std

View file

@ -1,40 +0,0 @@
--- build/rust/allocator/alias.h.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/alias.h
@@ -0,0 +1,37 @@
+// Copyright 2023 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+// This file has been copied from //base/debug/alias.h (and then trimmed to just
+// the APIs / macros needed by //build/rust/std; additionally the APIs were
+// moved into the `build_rust_std` namespace).
+//
+// TODO(crbug.com/40279749): Avoid code duplication / reuse code.
+
+#ifndef BUILD_RUST_ALLOCATOR_ALIAS_H_
+#define BUILD_RUST_ALLOCATOR_ALIAS_H_
+
+#include <stddef.h>
+
+namespace build_rust_std {
+namespace debug {
+
+// Make the optimizer think that |var| is aliased. This can be used to prevent a
+// local variable from being optimized out (which is something that
+// `NO_CODE_FOLDING` macro definition below depends on). See
+// //base/debug/alias.h for more details.
+void Alias(const void* var);
+
+} // namespace debug
+
+} // namespace build_rust_std
+
+// Prevent code folding (where a linker identifies functions that are
+// bit-identical and overlays them, which saves space but it leads to confusing
+// call stacks because multiple symbols are at the same address). See
+// //base/debug/alias.h for more details.
+#define NO_CODE_FOLDING() \
+ const int line_number = __LINE__; \
+ build_rust_std::debug::Alias(&line_number)
+
+#endif // BUILD_RUST_ALLOCATOR_ALIAS_H_

View file

@ -1,20 +0,0 @@
--- build/rust/allocator/alloc_error_handler_impl.cc.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/alloc_error_handler_impl.cc
@@ -0,0 +1,17 @@
+// Copyright 2025 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "build/rust/allocator/alloc_error_handler_impl.h"
+
+#include "build/rust/allocator/alias.h"
+#include "build/rust/allocator/immediate_crash.h"
+
+namespace rust_allocator_internal {
+
+void alloc_error_handler_impl() {
+ NO_CODE_FOLDING();
+ IMMEDIATE_CRASH();
+}
+
+} // namespace rust_allocator_internal

View file

@ -1,24 +0,0 @@
--- build/rust/allocator/alloc_error_handler_impl.h.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/alloc_error_handler_impl.h
@@ -0,0 +1,21 @@
+// Copyright 2025 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef BUILD_RUST_ALLOCATOR_ALLOC_ERROR_HANDLER_IMPL_H_
+#define BUILD_RUST_ALLOCATOR_ALLOC_ERROR_HANDLER_IMPL_H_
+
+// This header exposes to Rust a C++ implementation of quickly crashing after an
+// allocation error. (The API below is called from `__rust_alloc_error_handler`
+// in `lib.rs`.)
+//
+// TODO(lukasza): Investigate if we can delete this `.h` / `.cc` and just call
+// `std::process::abort()` (or something else?) directly from `.rs`. The main
+// open question is how much we care about `NO_CODE_FOLDING`.
+namespace rust_allocator_internal {
+
+void alloc_error_handler_impl();
+
+} // namespace rust_allocator_internal
+
+#endif // BUILD_RUST_ALLOCATOR_ALLOC_ERROR_HANDLER_IMPL_H_

View file

@ -1,108 +0,0 @@
--- build/rust/allocator/allocator_impls.cc.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/allocator_impls.cc
@@ -0,0 +1,105 @@
+// Copyright 2021 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "build/rust/allocator/allocator_impls.h"
+
+#ifdef UNSAFE_BUFFERS_BUILD
+// TODO(crbug.com/390223051): Remove C-library calls to fix the errors.
+#pragma allow_unsafe_libc_calls
+#endif
+
+#include <cstddef>
+#include <cstring>
+
+#include "build/build_config.h"
+#include "build/rust/allocator/buildflags.h"
+
+#if BUILDFLAG(RUST_ALLOCATOR_USES_PARTITION_ALLOC)
+#include "partition_alloc/partition_alloc_constants.h" // nogncheck
+#include "partition_alloc/shim/allocator_shim.h" // nogncheck
+#elif BUILDFLAG(RUST_ALLOCATOR_USES_ALIGNED_MALLOC)
+#include <cstdlib>
+#endif
+
+namespace rust_allocator_internal {
+
+unsigned char* alloc(size_t size, size_t align) {
+#if BUILDFLAG(RUST_ALLOCATOR_USES_PARTITION_ALLOC)
+ // PartitionAlloc will crash if given an alignment larger than this.
+ if (align > partition_alloc::internal::kMaxSupportedAlignment) {
+ return nullptr;
+ }
+
+ // We use unchecked allocation paths in PartitionAlloc rather than going
+ // through its shims in `malloc()` etc so that we can support fallible
+ // allocation paths such as Vec::try_reserve without crashing on allocation
+ // failure.
+ if (align <= alignof(std::max_align_t)) {
+ return static_cast<unsigned char*>(allocator_shim::UncheckedAlloc(size));
+ } else {
+ return static_cast<unsigned char*>(
+ allocator_shim::UncheckedAlignedAlloc(size, align));
+ }
+#elif BUILDFLAG(RUST_ALLOCATOR_USES_ALIGNED_MALLOC)
+ return static_cast<unsigned char*>(_aligned_malloc(size, align));
+#else
+#error This configuration is not supported.
+#endif
+}
+
+void dealloc(unsigned char* p, size_t size, size_t align) {
+#if BUILDFLAG(RUST_ALLOCATOR_USES_PARTITION_ALLOC)
+ if (align <= alignof(std::max_align_t)) {
+ allocator_shim::UncheckedFree(p);
+ } else {
+ allocator_shim::UncheckedAlignedFree(p);
+ }
+#elif BUILDFLAG(RUST_ALLOCATOR_USES_ALIGNED_MALLOC)
+ return _aligned_free(p);
+#else
+#error This configuration is not supported.
+#endif
+}
+
+unsigned char* realloc(unsigned char* p,
+ size_t old_size,
+ size_t align,
+ size_t new_size) {
+#if BUILDFLAG(RUST_ALLOCATOR_USES_PARTITION_ALLOC)
+ // We use unchecked allocation paths in PartitionAlloc rather than going
+ // through its shims in `malloc()` etc so that we can support fallible
+ // allocation paths such as Vec::try_reserve without crashing on allocation
+ // failure.
+ if (align <= alignof(std::max_align_t)) {
+ return static_cast<unsigned char*>(
+ allocator_shim::UncheckedRealloc(p, new_size));
+ } else {
+ return static_cast<unsigned char*>(
+ allocator_shim::UncheckedAlignedRealloc(p, new_size, align));
+ }
+#elif BUILDFLAG(RUST_ALLOCATOR_USES_ALIGNED_MALLOC)
+ return static_cast<unsigned char*>(_aligned_realloc(p, new_size, align));
+#else
+#error This configuration is not supported.
+#endif
+}
+
+unsigned char* alloc_zeroed(size_t size, size_t align) {
+#if BUILDFLAG(RUST_ALLOCATOR_USES_PARTITION_ALLOC) || \
+ BUILDFLAG(RUST_ALLOCATOR_USES_ALIGNED_MALLOC)
+ // TODO(danakj): When RUST_ALLOCATOR_USES_PARTITION_ALLOC is true, it's
+ // possible that a partition_alloc::UncheckedAllocZeroed() call would perform
+ // better than partition_alloc::UncheckedAlloc() + memset. But there is no
+ // such API today. See b/342251590.
+ unsigned char* p = alloc(size, align);
+ if (p) {
+ memset(p, 0, size);
+ }
+ return p;
+#else
+#error This configuration is not supported.
+#endif
+}
+
+} // namespace rust_allocator_internal

View file

@ -1,27 +0,0 @@
--- build/rust/allocator/allocator_impls.h.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/allocator_impls.h
@@ -0,0 +1,24 @@
+// Copyright 2025 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef BUILD_RUST_ALLOCATOR_ALLOCATOR_IMPLS_H_
+#define BUILD_RUST_ALLOCATOR_ALLOCATOR_IMPLS_H_
+
+#include <cstddef>
+
+// This header exposes a C++ allocator (e.g. PartitionAlloc) to Rust.
+// The APIs below are called from `impl GlobalAlloc` in `lib.rs`.
+namespace rust_allocator_internal {
+
+unsigned char* alloc(size_t size, size_t align);
+void dealloc(unsigned char* p, size_t size, size_t align);
+unsigned char* realloc(unsigned char* p,
+ size_t old_size,
+ size_t align,
+ size_t new_size);
+unsigned char* alloc_zeroed(size_t size, size_t align);
+
+} // namespace rust_allocator_internal
+
+#endif // BUILD_RUST_ALLOCATOR_ALLOCATOR_IMPLS_H_

View file

@ -1,22 +0,0 @@
--- build/rust/allocator/allocator_impls_ffi.rs.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/allocator_impls_ffi.rs
@@ -0,0 +1,19 @@
+// Copyright 2025 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+//! FFI for `allocator_impls.h` is in a separate `.rs` file/module to
+//! better support conditional compilation (these functions are only
+//! used under `#[cfg(rust_allocator_uses_allocator_impls_h)]`.
+
+#[cxx::bridge(namespace = "rust_allocator_internal")]
+pub mod ffi {
+ extern "C++" {
+ include!("build/rust/allocator/allocator_impls.h");
+
+ unsafe fn alloc(size: usize, align: usize) -> *mut u8;
+ unsafe fn dealloc(p: *mut u8, size: usize, align: usize);
+ unsafe fn realloc(p: *mut u8, old_size: usize, align: usize, new_size: usize) -> *mut u8;
+ unsafe fn alloc_zeroed(size: usize, align: usize) -> *mut u8;
+ }
+}

View file

@ -1,41 +0,0 @@
--- build/rust/allocator/compiler_specific.h.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/compiler_specific.h
@@ -0,0 +1,38 @@
+// Copyright 2023 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+// This file has been copied from //base/compiler_specific.h (and then
+// significantly trimmed to just the APIs / macros needed by //build/rust/std).
+//
+// TODO(crbug.com/40279749): Avoid code duplication / reuse code.
+
+#ifndef BUILD_RUST_ALLOCATOR_COMPILER_SPECIFIC_H_
+#define BUILD_RUST_ALLOCATOR_COMPILER_SPECIFIC_H_
+
+#include "build/build_config.h"
+
+#if defined(COMPILER_MSVC) && !defined(__clang__)
+#error "Only clang-cl is supported on Windows, see https://crbug.com/988071"
+#endif
+
+#if defined(__has_attribute)
+#define HAS_ATTRIBUTE(x) __has_attribute(x)
+#else
+#define HAS_ATTRIBUTE(x) 0
+#endif
+
+// Annotate a function indicating it should not be inlined.
+// Use like:
+// NOINLINE void DoStuff() { ... }
+#if defined(__clang__) && HAS_ATTRIBUTE(noinline)
+#define NOINLINE [[clang::noinline]]
+#elif defined(COMPILER_GCC) && HAS_ATTRIBUTE(noinline)
+#define NOINLINE __attribute__((noinline))
+#elif defined(COMPILER_MSVC)
+#define NOINLINE __declspec(noinline)
+#else
+#define NOINLINE
+#endif
+
+#endif // BUILD_RUST_ALLOCATOR_COMPILER_SPECIFIC_H_

View file

@ -1,174 +0,0 @@
--- build/rust/allocator/immediate_crash.h.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/immediate_crash.h
@@ -0,0 +1,171 @@
+// Copyright 2021 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+// This file has been copied from //base/immediate_crash.h.
+// TODO(crbug.com/40279749): Avoid code duplication / reuse code.
+
+#ifndef BUILD_RUST_ALLOCATOR_IMMEDIATE_CRASH_H_
+#define BUILD_RUST_ALLOCATOR_IMMEDIATE_CRASH_H_
+
+#include "build/build_config.h"
+
+// Crashes in the fastest possible way with no attempt at logging.
+// There are several constraints; see http://crbug.com/664209 for more context.
+//
+// - TRAP_SEQUENCE_() must be fatal. It should not be possible to ignore the
+// resulting exception or simply hit 'continue' to skip over it in a debugger.
+// - Different instances of TRAP_SEQUENCE_() must not be folded together, to
+// ensure crash reports are debuggable. Unlike __builtin_trap(), asm volatile
+// blocks will not be folded together.
+// Note: TRAP_SEQUENCE_() previously required an instruction with a unique
+// nonce since unlike clang, GCC folds together identical asm volatile
+// blocks.
+// - TRAP_SEQUENCE_() must produce a signal that is distinct from an invalid
+// memory access.
+// - TRAP_SEQUENCE_() must be treated as a set of noreturn instructions.
+// __builtin_unreachable() is used to provide that hint here. clang also uses
+// this as a heuristic to pack the instructions in the function epilogue to
+// improve code density.
+//
+// Additional properties that are nice to have:
+// - TRAP_SEQUENCE_() should be as compact as possible.
+// - The first instruction of TRAP_SEQUENCE_() should not change, to avoid
+// shifting crash reporting clusters. As a consequence of this, explicit
+// assembly is preferred over intrinsics.
+// Note: this last bullet point may no longer be true, and may be removed in
+// the future.
+
+// Note: TRAP_SEQUENCE Is currently split into two macro helpers due to the fact
+// that clang emits an actual instruction for __builtin_unreachable() on certain
+// platforms (see https://crbug.com/958675). In addition, the int3/bkpt/brk will
+// be removed in followups, so splitting it up like this now makes it easy to
+// land the followups.
+
+#if defined(COMPILER_GCC)
+
+#if BUILDFLAG(IS_NACL)
+
+// Crash report accuracy is not guaranteed on NaCl.
+#define TRAP_SEQUENCE1_() __builtin_trap()
+#define TRAP_SEQUENCE2_() asm volatile("")
+
+#elif defined(ARCH_CPU_X86_FAMILY)
+
+// TODO(crbug.com/40625592): In theory, it should be possible to use just
+// int3. However, there are a number of crashes with SIGILL as the exception
+// code, so it seems likely that there's a signal handler that allows execution
+// to continue after SIGTRAP.
+#define TRAP_SEQUENCE1_() asm volatile("int3")
+
+#if BUILDFLAG(IS_APPLE)
+// Intentionally empty: __builtin_unreachable() is always part of the sequence
+// (see IMMEDIATE_CRASH below) and already emits a ud2 on Mac.
+#define TRAP_SEQUENCE2_() asm volatile("")
+#else
+#define TRAP_SEQUENCE2_() asm volatile("ud2")
+#endif // BUILDFLAG(IS_APPLE)
+
+#elif defined(ARCH_CPU_ARMEL)
+
+// bkpt will generate a SIGBUS when running on armv7 and a SIGTRAP when running
+// as a 32 bit userspace app on arm64. There doesn't seem to be any way to
+// cause a SIGTRAP from userspace without using a syscall (which would be a
+// problem for sandboxing).
+// TODO(crbug.com/40625592): Remove bkpt from this sequence.
+#define TRAP_SEQUENCE1_() asm volatile("bkpt #0")
+#define TRAP_SEQUENCE2_() asm volatile("udf #0")
+
+#elif defined(ARCH_CPU_ARM64)
+
+// This will always generate a SIGTRAP on arm64.
+// TODO(crbug.com/40625592): Remove brk from this sequence.
+#define TRAP_SEQUENCE1_() asm volatile("brk #0")
+#define TRAP_SEQUENCE2_() asm volatile("hlt #0")
+
+#else
+
+// Crash report accuracy will not be guaranteed on other architectures, but at
+// least this will crash as expected.
+#define TRAP_SEQUENCE1_() __builtin_trap()
+#define TRAP_SEQUENCE2_() asm volatile("")
+
+#endif // ARCH_CPU_*
+
+#elif defined(COMPILER_MSVC)
+
+#if !defined(__clang__)
+
+// MSVC x64 doesn't support inline asm, so use the MSVC intrinsic.
+#define TRAP_SEQUENCE1_() __debugbreak()
+#define TRAP_SEQUENCE2_()
+
+#elif defined(ARCH_CPU_ARM64)
+
+// Windows ARM64 uses "BRK #F000" as its breakpoint instruction, and
+// __debugbreak() generates that in both VC++ and clang.
+#define TRAP_SEQUENCE1_() __debugbreak()
+// Intentionally empty: __builtin_unreachable() is always part of the sequence
+// (see IMMEDIATE_CRASH below) and already emits a ud2 on Win64,
+// https://crbug.com/958373
+#define TRAP_SEQUENCE2_() __asm volatile("")
+
+#else
+
+#define TRAP_SEQUENCE1_() asm volatile("int3")
+#define TRAP_SEQUENCE2_() asm volatile("ud2")
+
+#endif // __clang__
+
+#else
+
+#error No supported trap sequence!
+
+#endif // COMPILER_GCC
+
+#define TRAP_SEQUENCE_() \
+ do { \
+ TRAP_SEQUENCE1_(); \
+ TRAP_SEQUENCE2_(); \
+ } while (false)
+
+// CHECK() and the trap sequence can be invoked from a constexpr function.
+// This could make compilation fail on GCC, as it forbids directly using inline
+// asm inside a constexpr function. However, it allows calling a lambda
+// expression including the same asm.
+// The side effect is that the top of the stacktrace will not point to the
+// calling function, but to this anonymous lambda. This is still useful as the
+// full name of the lambda will typically include the name of the function that
+// calls CHECK() and the debugger will still break at the right line of code.
+#if !defined(COMPILER_GCC) || defined(__clang__)
+
+#define WRAPPED_TRAP_SEQUENCE_() TRAP_SEQUENCE_()
+
+#else
+
+#define WRAPPED_TRAP_SEQUENCE_() \
+ do { \
+ [] { TRAP_SEQUENCE_(); }(); \
+ } while (false)
+
+#endif // !defined(COMPILER_GCC) || defined(__clang__)
+
+#if defined(__clang__) || defined(COMPILER_GCC)
+
+// __builtin_unreachable() hints to the compiler that this is noreturn and can
+// be packed in the function epilogue.
+#define IMMEDIATE_CRASH() \
+ ({ \
+ WRAPPED_TRAP_SEQUENCE_(); \
+ __builtin_unreachable(); \
+ })
+
+#else
+
+// This is supporting non-chromium user of logging.h to build with MSVC, like
+// pdfium. On MSVC there is no __builtin_unreachable().
+#define IMMEDIATE_CRASH() WRAPPED_TRAP_SEQUENCE_()
+
+#endif // defined(__clang__) || defined(COMPILER_GCC)
+
+#endif // BUILD_RUST_ALLOCATOR_IMMEDIATE_CRASH_H_

View file

@ -1,122 +0,0 @@
--- build/rust/allocator/lib.rs.orig 2025-05-20 09:16:26 UTC
+++ build/rust/allocator/lib.rs
@@ -0,0 +1,119 @@
+// Copyright 2025 The Chromium Authors
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+//! Define the allocator that Rust code in Chrome should use.
+//!
+//! Any final artifact that depends on this crate, even transitively, will use
+//! the allocator defined here.
+//!
+//! List of known issues:
+//!
+//! 1. We'd like to use PartitionAlloc on Windows, but the stdlib uses Windows
+//! heap functions directly that PartitionAlloc can not intercept.
+//! 2. We'd like `Vec::try_reserve` to fail at runtime on Linux instead of
+//! crashing in malloc() where PartitionAlloc replaces that function.
+
+// Required to apply weak linkage to symbols.
+//
+// TODO(https://crbug.com/410596442): Stop using unstable features here.
+// https://github.com/rust-lang/rust/issues/29603 tracks stabilization of the `linkage` feature.
+#![feature(linkage)]
+// Required to apply `#[rustc_std_internal_symbol]` to our alloc error handler
+// so the name is correctly mangled as rustc expects.
+//
+// TODO(https://crbug.com/410596442): Stop using internal features here.
+#![allow(internal_features)]
+#![feature(rustc_attrs)]
+
+// This module is in a separate source file to avoid having to teach `cxxbridge`
+// about conditional compilation.
+#[cfg(rust_allocator_uses_allocator_impls_h)]
+mod allocator_impls_ffi;
+
+/// Module that provides `#[global_allocator]` / `GlobalAlloc` interface for
+/// using an allocator from C++.
+#[cfg(rust_allocator_uses_allocator_impls_h)]
+mod cpp_allocator {
+ use super::allocator_impls_ffi::ffi;
+ use std::alloc::{GlobalAlloc, Layout};
+
+ struct Allocator;
+
+ unsafe impl GlobalAlloc for Allocator {
+ unsafe fn alloc(&self, layout: Layout) -> *mut u8 {
+ unsafe { ffi::alloc(layout.size(), layout.align()) }
+ }
+
+ unsafe fn dealloc(&self, ptr: *mut u8, layout: Layout) {
+ unsafe {
+ ffi::dealloc(ptr, layout.size(), layout.align());
+ }
+ }
+
+ unsafe fn alloc_zeroed(&self, layout: Layout) -> *mut u8 {
+ unsafe { ffi::alloc_zeroed(layout.size(), layout.align()) }
+ }
+
+ unsafe fn realloc(&self, ptr: *mut u8, layout: Layout, new_size: usize) -> *mut u8 {
+ unsafe { ffi::realloc(ptr, layout.size(), layout.align(), new_size) }
+ }
+ }
+
+ #[global_allocator]
+ static GLOBAL: Allocator = Allocator;
+}
+
+/// Module that provides `#[global_allocator]` / `GlobalAlloc` interface for
+/// using the default Rust allocator.
+#[cfg(not(rust_allocator_uses_allocator_impls_h))]
+mod rust_allocator {
+ #[global_allocator]
+ static GLOBAL: std::alloc::System = std::alloc::System;
+}
+
+/// Module that provides global symbols that are needed both by `cpp_allocator`
+/// and `rust_allocator`.
+///
+/// When `rustc` drives linking, then it will define the symbols below. But
+/// Chromium only uses `rustc` to link Rust-only executables (e.g. `build.rs`
+/// scripts) and otherwise uses a non-Rust linker. This is why we have to
+/// manually define a few symbols below. We define those symbols
+/// as "weak" symbols, so that Rust-provided symbols "win" in case where Rust
+/// actually does drive the linking. This hack works (not only for Chromium,
+/// but also for google3 and other projects), but isn't officially supported by
+/// `rustc`.
+///
+/// TODO(https://crbug.com/410596442): Stop using internal features here.
+mod both_allocators {
+ /// As part of rustc's contract for using `#[global_allocator]` without
+ /// rustc-generated shims we must define this symbol, since we are opting in
+ /// to unstable functionality. See https://github.com/rust-lang/rust/issues/123015
+ #[no_mangle]
+ #[linkage = "weak"]
+ static __rust_no_alloc_shim_is_unstable: u8 = 0;
+
+ // Mangle the symbol name as rustc expects.
+ #[rustc_std_internal_symbol]
+ #[allow(non_upper_case_globals)]
+ #[linkage = "weak"]
+ static __rust_alloc_error_handler_should_panic: u8 = 0;
+
+ // Mangle the symbol name as rustc expects.
+ #[rustc_std_internal_symbol]
+ #[allow(non_upper_case_globals)]
+ #[linkage = "weak"]
+ fn __rust_alloc_error_handler(_size: usize, _align: usize) {
+ // TODO(lukasza): Investigate if we can just call `std::process::abort()` here.
+ // (Not really _needed_, but it could simplify code a little bit.)
+ unsafe { ffi::alloc_error_handler_impl() }
+ }
+
+ #[cxx::bridge(namespace = "rust_allocator_internal")]
+ mod ffi {
+ extern "C++" {
+ include!("build/rust/allocator/alloc_error_handler_impl.h");
+ unsafe fn alloc_error_handler_impl();
+ }
+ }
+}

View file

@ -1,25 +0,0 @@
--- build/rust/cargo_crate.gni.orig 2025-05-20 09:16:26 UTC
+++ build/rust/cargo_crate.gni
@@ -259,6 +259,12 @@ template("cargo_crate") {
# Don't import the `chromium` crate into third-party code.
no_chromium_prelude = true
+ # Don't depend on the chrome-specific #[global_allocator] crate from
+ # third-party code. This avoids some dependency cycle issues. The allocator
+ # crate will still be used if it exists anywhere in the dependency graph for
+ # a given linked artifact.
+ no_allocator_crate = true
+
rustc_metadata = _rustc_metadata
# TODO(crbug.com/40259764): don't default to true. This requires changes to
@@ -482,6 +488,9 @@ template("cargo_crate") {
# Don't import the `chromium` crate into third-party code.
no_chromium_prelude = true
+
+ # Build scripts do not need to link to chrome's allocator.
+ no_allocator_crate = true
# The ${_build_script_name}_output target looks for the exe in this
# location. Due to how the Windows component build works, this has to

View file

@ -1,12 +0,0 @@
--- build/rust/rust_macro.gni.orig 2025-05-20 09:16:26 UTC
+++ build/rust/rust_macro.gni
@@ -16,6 +16,9 @@ template("rust_macro") {
forward_variables_from(invoker, TESTONLY_AND_VISIBILITY)
proc_macro_configs = invoker.configs
target_type = "rust_proc_macro"
+
+ # Macros are loaded by rustc and shouldn't use chrome's allocation routines.
+ no_allocator_crate = true
}
}

View file

@ -1,13 +0,0 @@
--- build/rust/rust_target.gni.orig 2025-05-20 09:16:26 UTC
+++ build/rust/rust_target.gni
@@ -339,6 +339,10 @@ template("rust_target") {
_rust_deps += [ "//build/rust/std" ]
}
+ if (!defined(invoker.no_allocator_crate) || !invoker.no_allocator_crate) {
+ _rust_deps += [ "//build/rust/allocator" ]
+ }
+
if (_build_unit_tests) {
_unit_test_target = "${_target_name}_unittests"
if (defined(invoker.unit_test_target)) {

View file

@ -1,58 +1,6 @@
--- build/rust/std/BUILD.gn.orig 2025-05-20 09:16:26 UTC
--- build/rust/std/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ build/rust/std/BUILD.gn
@@ -15,51 +15,12 @@
# allocator functions to PartitionAlloc when `use_partition_alloc_as_malloc` is
# true, so that Rust and C++ use the same allocator backend.
-import("//build/buildflag_header.gni")
import("//build/config/compiler/compiler.gni")
import("//build/config/coverage/coverage.gni")
import("//build/config/rust.gni")
import("//build/config/sanitizers/sanitizers.gni")
-rust_allocator_uses_partition_alloc = false
-if (build_with_chromium) {
- import("//base/allocator/partition_allocator/partition_alloc.gni")
- rust_allocator_uses_partition_alloc = use_partition_alloc_as_malloc
-}
-
-buildflag_header("buildflags") {
- header = "buildflags.h"
- flags = [
- "RUST_ALLOCATOR_USES_PARTITION_ALLOC=$rust_allocator_uses_partition_alloc",
- ]
- visibility = [ ":*" ]
-}
-
if (toolchain_has_rust) {
- # If clang performs the link step, we need to provide the allocator symbols
- # that are normally injected by rustc during linking.
- #
- # We also "happen to" use this to redirect allocations to PartitionAlloc,
- # though that would be better done through a #[global_allocator] crate (see
- # above).
- source_set("remap_alloc") {
- public_deps = []
- if (rust_allocator_uses_partition_alloc) {
- public_deps += [ "//base/allocator/partition_allocator:partition_alloc" ]
- }
- deps = [ ":buildflags" ]
- sources = [
- # `alias.*`, `compiler_specific.h`, and `immediate_crash.*` have been
- # copied from `//base`.
- # TODO(crbug.com/40279749): Avoid duplication / reuse code.
- "alias.cc",
- "alias.h",
- "compiler_specific.h",
- "immediate_crash.h",
- "remap_alloc.cc",
- ]
- }
-
# List of Rust stdlib rlibs which are present in the official Rust toolchain
# we are using from the Android team. This is usually a version or two behind
# nightly. Generally this matches the toolchain we build ourselves, but if
@@ -89,13 +50,20 @@ if (toolchain_has_rust) {
@@ -50,13 +50,20 @@ if (toolchain_has_rust) {
# These are no longer present in the Windows toolchain.
stdlib_files += [
"addr2line",
@ -74,7 +22,7 @@
}
if (toolchain_for_rust_host_build_tools) {
@@ -115,7 +83,6 @@ if (toolchain_has_rust) {
@@ -76,7 +83,6 @@ if (toolchain_has_rust) {
# don't need to pass to the C++ linker because they're used for specialized
# purposes.
skip_stdlib_files = [
@ -82,25 +30,3 @@
"rustc_std_workspace_alloc",
"rustc_std_workspace_core",
"rustc_std_workspace_std",
@@ -269,8 +236,6 @@ if (toolchain_has_rust) {
foreach(libname, stdlib_files + skip_stdlib_files) {
deps += [ "rules:$libname" ]
}
-
- public_deps = [ ":remap_alloc" ]
}
} else {
action("find_stdlib") {
@@ -396,12 +361,6 @@ if (toolchain_has_rust) {
":stdlib_public_dependent_libs",
]
deps = [ ":prebuilt_rustc_copy_to_sysroot" ]
-
- # The host builds tools toolchain supports Rust only and does not use
- # the allocator remapping to point it to PartitionAlloc.
- if (!toolchain_for_rust_host_build_tools) {
- deps += [ ":remap_alloc" ]
- }
}
}
}

View file

@ -1,6 +1,6 @@
--- cc/base/features.cc.orig 2025-05-05 10:57:53 UTC
--- cc/base/features.cc.orig 2025-05-28 14:55:43 UTC
+++ cc/base/features.cc
@@ -48,7 +48,7 @@ const base::FeatureParam<int> kDeferImplInvalidationFr
@@ -52,7 +52,7 @@ const base::FeatureParam<int> kDeferImplInvalidationFr
// be using a separate flag to control the launch on GL.
BASE_FEATURE(kUseDMSAAForTiles,
"UseDMSAAForTiles",

View file

@ -1,4 +1,4 @@
--- chrome/app/chrome_main_delegate.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/app/chrome_main_delegate.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/app/chrome_main_delegate.cc
@@ -147,7 +147,7 @@
#include "components/webui/about/credit_utils.h"
@ -75,7 +75,7 @@
// On Linux, Chrome does not support running multiple copies under different
// DISPLAYs, so the profile directory can be specified in the environment to
// support the virtual desktop use-case.
@@ -667,7 +667,7 @@ void RecordMainStartupMetrics(const StartupTimestamps&
@@ -669,7 +669,7 @@ void RecordMainStartupMetrics(const StartupTimestamps&
#endif
#if BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || \
@ -84,7 +84,7 @@
// Record the startup process creation time on supported platforms. On Android
// this is recorded in ChromeMainDelegateAndroid.
startup_metric_utils::GetCommon().RecordStartupProcessCreationTime(
@@ -826,7 +826,7 @@ std::optional<int> ChromeMainDelegate::PostEarlyInitia
@@ -828,7 +828,7 @@ std::optional<int> ChromeMainDelegate::PostEarlyInitia
#if BUILDFLAG(IS_OZONE)
// Initialize Ozone platform and add required feature flags as per platform's
// properties.

View file

@ -1,6 +1,6 @@
--- chrome/browser/BUILD.gn.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/BUILD.gn
@@ -6866,6 +6866,13 @@ static_library("browser") {
@@ -6911,6 +6911,13 @@ static_library("browser") {
[ "//third_party/webrtc/modules/desktop_capture:pipewire_config" ]
}

View file

@ -1,6 +1,6 @@
--- chrome/browser/about_flags.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/about_flags.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/about_flags.cc
@@ -260,7 +260,7 @@
@@ -262,7 +262,7 @@
#include "extensions/common/extension_features.h"
#endif
@ -9,7 +9,7 @@
#include "base/allocator/buildflags.h"
#endif
@@ -349,7 +349,7 @@
@@ -352,7 +352,7 @@
#include "device/vr/public/cpp/switches.h"
#endif
@ -18,7 +18,7 @@
#include "ui/ozone/public/ozone_switches.h"
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
@@ -359,7 +359,7 @@
@@ -362,7 +362,7 @@
#include "chrome/browser/win/mica_titlebar.h"
#endif
@ -27,7 +27,7 @@
#include "chrome/browser/contextual_cueing/contextual_cueing_features.h" // nogncheck
#include "chrome/browser/enterprise/profile_management/profile_management_features.h"
#include "chrome/browser/enterprise/webstore/features.h"
@@ -371,7 +371,7 @@
@@ -374,7 +374,7 @@
#include "components/user_education/common/user_education_features.h" // nogncheck
#endif
@ -36,7 +36,7 @@
#include "chrome/browser/ui/ui_features.h"
#include "ui/base/ui_base_features.h"
#endif
@@ -423,7 +423,7 @@ const FeatureEntry::Choice kPullToRefreshChoices[] = {
@@ -426,7 +426,7 @@ const FeatureEntry::Choice kPullToRefreshChoices[] = {
#endif // USE_AURA
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -45,7 +45,7 @@
const FeatureEntry::FeatureParam kLocalNetworkAccessChecksBlock[] = {
{"LocalNetworkAccessChecksWarn", "false"}};
@@ -539,7 +539,7 @@ const FeatureEntry::FeatureVariation kDXGIWaitableSwap
@@ -542,7 +542,7 @@ const FeatureEntry::FeatureVariation kDXGIWaitableSwap
{"Max 3 Frames", &kDXGIWaitableSwapChain3Frames, 1, nullptr}};
#endif
@ -54,7 +54,7 @@
const FeatureEntry::Choice kOzonePlatformHintRuntimeChoices[] = {
{flag_descriptions::kOzonePlatformHintChoiceDefault, "", ""},
{flag_descriptions::kOzonePlatformHintChoiceAuto,
@@ -852,6 +852,26 @@ const FeatureEntry::FeatureVariation
@@ -899,6 +899,26 @@ const FeatureEntry::FeatureVariation
std::size(kWebIdentityDigitalIdentityCredentialHighRiskDialogParam),
nullptr}};
@ -81,7 +81,7 @@
const FeatureEntry::FeatureParam kClipboardMaximumAge60Seconds[] = {
{"UIClipboardMaximumAge", "60"}};
const FeatureEntry::FeatureParam kClipboardMaximumAge90Seconds[] = {
@@ -1227,7 +1247,7 @@ constexpr FeatureEntry::FeatureVariation
@@ -1274,7 +1294,7 @@ constexpr FeatureEntry::FeatureVariation
#endif // !BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_MAC) || \
@ -90,7 +90,7 @@
const FeatureEntry::FeatureParam kHistoryEmbeddingsAtKeywordAcceleration[]{
{"AtKeywordAcceleration", "true"},
};
@@ -1265,7 +1285,7 @@ const FeatureEntry::FeatureVariation kRemotePageMetada
@@ -1312,7 +1332,7 @@ const FeatureEntry::FeatureVariation kRemotePageMetada
};
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_MAC) || \
@ -99,7 +99,7 @@
// A limited number of combinations of the rich autocompletion params.
const FeatureEntry::FeatureParam kOmniboxRichAutocompletionAggressive1[] = {
@@ -3555,7 +3575,7 @@ const FeatureEntry::FeatureVariation
@@ -3720,7 +3740,7 @@ const FeatureEntry::FeatureVariation kAndroidThemeModu
#endif // BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -108,7 +108,7 @@
const flags_ui::FeatureEntry::FeatureParam kPwaNavigationCapturingDefaultOn[] =
{{"link_capturing_state", "on_by_default"}};
const flags_ui::FeatureEntry::FeatureParam kPwaNavigationCapturingDefaultOff[] =
@@ -4059,7 +4079,7 @@ const FeatureEntry::FeatureVariation kSkiaGraphiteVari
@@ -4179,7 +4199,7 @@ const FeatureEntry::FeatureVariation kSkiaGraphiteVari
std::size(kSkiaGraphite_DebugLabelsEnabled), nullptr},
};
@ -117,7 +117,7 @@
const FeatureEntry::FeatureParam kTranslationAPI_SkipLanguagePackLimit[] = {
{"TranslationAPIAcceptLanguagesCheck", "false"},
{"TranslationAPILimitLanguagePackCount", "false"}};
@@ -4125,7 +4145,7 @@ const FeatureEntry::FeatureVariation
@@ -4245,7 +4265,7 @@ const FeatureEntry::FeatureVariation
1, nullptr},
};
@ -126,7 +126,7 @@
const FeatureEntry::FeatureParam kContextualCueingEnabledNoEngagementCap[] = {
{"BackoffTime", "0h"},
{"BackoffMultiplierBase", "0.0"},
@@ -4992,7 +5012,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -5175,7 +5195,7 @@ const FeatureEntry kFeatureEntries[] = {
},
#endif // BUILDFLAG(IS_WIN)
@ -135,7 +135,7 @@
{
"fluent-overlay-scrollbars",
flag_descriptions::kFluentOverlayScrollbarsName,
@@ -5279,7 +5299,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -5467,7 +5487,7 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kEnableIsolatedWebAppDevModeName,
flag_descriptions::kEnableIsolatedWebAppDevModeDescription, kOsDesktop,
FEATURE_VALUE_TYPE(features::kIsolatedWebAppDevMode)},
@ -144,7 +144,7 @@
{"enable-iwa-key-distribution-component",
flag_descriptions::kEnableIwaKeyDistributionComponentName,
flag_descriptions::kEnableIwaKeyDistributionComponentDescription,
@@ -5500,7 +5520,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -5689,7 +5709,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(features::kWebShare)},
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
@ -153,7 +153,7 @@
{"pulseaudio-loopback-for-cast",
flag_descriptions::kPulseaudioLoopbackForCastName,
flag_descriptions::kPulseaudioLoopbackForCastDescription, kOsLinux,
@@ -5541,6 +5561,16 @@ const FeatureEntry kFeatureEntries[] = {
@@ -5730,6 +5750,16 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kWaylandSessionManagementName,
flag_descriptions::kWaylandSessionManagementDescription, kOsLinux,
FEATURE_VALUE_TYPE(features::kWaylandSessionManagement)},
@ -170,16 +170,16 @@
#endif // BUILDFLAG(IS_LINUX)
#if BUILDFLAG(ENABLE_VR)
@@ -6427,7 +6457,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -6629,7 +6659,7 @@ const FeatureEntry kFeatureEntries[] = {
"MlUrlScoring")},
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_MAC) || \
- BUILDFLAG(IS_WIN)
+ BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
{"omnibox-domain-suggestions",
flag_descriptions::kOmniboxDomainSuggestionsName,
flag_descriptions::kOmniboxDomainSuggestionsDescription, kOsDesktop,
@@ -6697,7 +6727,7 @@ const FeatureEntry kFeatureEntries[] = {
{"omnibox-contextual-search-actions-at-top",
flag_descriptions::kOmniboxContextualSearchActionsAtTopName,
flag_descriptions::kOmniboxContextualSearchActionsAtTopDescription,
@@ -6933,7 +6963,7 @@ const FeatureEntry kFeatureEntries[] = {
kNumSrpZpsRelatedSearches,
"PowerTools")},
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_MAC) || \
@ -188,7 +188,7 @@
{"history-embeddings", flag_descriptions::kHistoryEmbeddingsName,
flag_descriptions::kHistoryEmbeddingsDescription, kOsDesktop,
FEATURE_WITH_PARAMS_VALUE_TYPE(history_embeddings::kHistoryEmbeddings,
@@ -7189,7 +7219,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -7421,7 +7451,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(printing::features::kAddPrinterViaPrintscanmgr)},
#endif // BUILDFLAG(IS_CHROMEOS)
@ -197,7 +197,7 @@
{"cups-ipp-printing-backend",
flag_descriptions::kCupsIppPrintingBackendName,
flag_descriptions::kCupsIppPrintingBackendDescription, kOsDesktop,
@@ -7437,7 +7467,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -7691,7 +7721,7 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kSupportToolScreenshotDescription, kOsDesktop,
FEATURE_VALUE_TYPE(features::kSupportToolScreenshot)},
@ -206,7 +206,7 @@
{"wasm-tts-component-updater-enabled",
flag_descriptions::kWasmTtsComponentUpdaterEnabledName,
flag_descriptions::kWasmTtsComponentUpdaterEnabledDescription, kOsDesktop,
@@ -8109,7 +8139,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -8373,7 +8403,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(media::kGlobalMediaControlsUpdatedUI)},
#endif // !BUILDFLAG(IS_CHROMEOS)
@ -215,7 +215,7 @@
{"enable-network-service-sandbox",
flag_descriptions::kEnableNetworkServiceSandboxName,
flag_descriptions::kEnableNetworkServiceSandboxDescription,
@@ -8774,7 +8804,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -9037,7 +9067,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(ash::features::kWallpaperGooglePhotosSharedAlbums)},
#endif // BUILDFLAG(IS_CHROMEOS)
@ -224,7 +224,7 @@
{"enable-get-all-screens-media", flag_descriptions::kGetAllScreensMediaName,
flag_descriptions::kGetAllScreensMediaDescription, kOsCrOS | kOsLinux,
FEATURE_VALUE_TYPE(blink::features::kGetAllScreensMedia)},
@@ -8799,7 +8829,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -9062,7 +9092,7 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kGlobalVaapiLockDescription, kOsCrOS | kOsLinux,
FEATURE_VALUE_TYPE(media::kGlobalVaapiLock)},
@ -233,8 +233,8 @@
{
"ui-debug-tools",
flag_descriptions::kUIDebugToolsName,
@@ -9275,7 +9305,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(features::kRenderPassDrawnRect)},
@@ -9542,7 +9572,7 @@ const FeatureEntry kFeatureEntries[] = {
#endif
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
- BUILDFLAG(IS_CHROMEOS)
@ -242,7 +242,7 @@
{"media-session-enter-picture-in-picture",
flag_descriptions::kMediaSessionEnterPictureInPictureName,
flag_descriptions::kMediaSessionEnterPictureInPictureDescription,
@@ -9924,7 +9954,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -10214,7 +10244,7 @@ const FeatureEntry kFeatureEntries[] = {
kOsDesktop | kOsAndroid,
FEATURE_VALUE_TYPE(features::kProcessPerSiteUpToMainFrameThreshold)},
@ -251,7 +251,7 @@
{"camera-mic-effects", flag_descriptions::kCameraMicEffectsName,
flag_descriptions::kCameraMicEffectsDescription,
static_cast<unsigned short>(kOsMac | kOsWin | kOsLinux),
@@ -10048,7 +10078,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -10338,7 +10368,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(chrome::android::kReadAloudTapToSeek)},
#endif
@ -260,7 +260,7 @@
{"third-party-profile-management",
flag_descriptions::kThirdPartyProfileManagementName,
flag_descriptions::kThirdPartyProfileManagementDescription,
@@ -10077,7 +10107,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -10367,7 +10397,7 @@ const FeatureEntry kFeatureEntries[] = {
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -269,7 +269,7 @@
{"enable-user-navigation-capturing-pwa",
flag_descriptions::kPwaNavigationCapturingName,
flag_descriptions::kPwaNavigationCapturingDescription,
@@ -10817,7 +10847,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11085,7 +11115,7 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kCanvasHibernationDescription, kOsAll,
FEATURE_VALUE_TYPE(blink::features::kCanvas2DHibernation)},
@ -278,7 +278,7 @@
{"enable-history-sync-optin",
flag_descriptions::kEnableHistorySyncOptinName,
flag_descriptions::kEnableHistorySyncOptinDescription,
@@ -10920,7 +10950,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11187,7 +11217,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(switches::kForceSupervisedSigninWithCapabilities)},
#endif // BUILDFLAG(IS_ANDROID)
@ -287,7 +287,7 @@
{"supervised-profile-safe-search",
flag_descriptions::kSupervisedProfileSafeSearchName,
flag_descriptions::kSupervisedProfileSafeSearchDescription,
@@ -11167,7 +11197,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11435,7 +11465,7 @@ const FeatureEntry kFeatureEntries[] = {
segmentation_platform::features::kSegmentationSurveyPage)},
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -296,7 +296,7 @@
{"autofill-enable-buy-now-pay-later",
flag_descriptions::kAutofillEnableBuyNowPayLaterName,
flag_descriptions::kAutofillEnableBuyNowPayLaterDescription, kOsDesktop,
@@ -11282,7 +11312,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11536,7 +11566,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(
autofill::features::kAutofillEnableCardInfoRuntimeRetrieval)},
@ -305,7 +305,7 @@
{"translation-api", flag_descriptions::kTranslationAPIName,
flag_descriptions::kTranslationAPIDescription, kOsMac | kOsWin | kOsLinux,
FEATURE_WITH_PARAMS_VALUE_TYPE(blink::features::kTranslationAPI,
@@ -11319,7 +11349,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11573,7 +11603,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(
password_manager::features::kPasswordFormClientsideClassifier)},
@ -314,7 +314,7 @@
{"contextual-cueing", flag_descriptions::kContextualCueingName,
flag_descriptions::kContextualCueingDescription,
kOsLinux | kOsMac | kOsWin,
@@ -11653,7 +11683,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11904,7 +11934,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(ui::kUseNewEtc1Encoder)},
#endif // !BUILDFLAG(IS_ANDROID)
@ -323,7 +323,7 @@
{"automatic-usb-detach", flag_descriptions::kAutomaticUsbDetachName,
flag_descriptions::kAutomaticUsbDetachDescription, kOsAndroid | kOsLinux,
FEATURE_VALUE_TYPE(features::kAutomaticUsbDetach)},
@@ -11703,7 +11733,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11954,7 +11984,7 @@ const FeatureEntry kFeatureEntries[] = {
#endif // !BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -332,7 +332,7 @@
{"autofill-enable-amount-extraction-desktop",
flag_descriptions::kAutofillEnableAmountExtractionDesktopName,
flag_descriptions::kAutofillEnableAmountExtractionDesktopDescription,
@@ -11723,7 +11753,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -11974,7 +12004,7 @@ const FeatureEntry kFeatureEntries[] = {
FEATURE_VALUE_TYPE(blink::features::kClipboardContentsId)},
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -341,7 +341,7 @@
{"autofill-enable-amount-extraction-allowlist-desktop",
flag_descriptions::kAutofillEnableAmountExtractionAllowlistDesktopName,
flag_descriptions::
@@ -11834,7 +11864,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -12092,7 +12122,7 @@ const FeatureEntry kFeatureEntries[] = {
apps::chrome_app_deprecation::kAllowUserInstalledChromeApps)},
#endif // BUILDFLAG(IS_CHROMEOS)
@ -350,7 +350,7 @@
{"chrome-web-store-navigation-throttle",
flag_descriptions::kChromeWebStoreNavigationThrottleName,
flag_descriptions::kChromeWebStoreNavigationThrottleDescription,
@@ -11869,7 +11899,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -12128,7 +12158,7 @@ const FeatureEntry kFeatureEntries[] = {
#endif // BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -359,7 +359,7 @@
{"autofill-enable-amount-extraction-desktop-logging",
flag_descriptions::kAutofillEnableAmountExtractionDesktopLoggingName,
flag_descriptions::
@@ -11899,7 +11929,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -12151,7 +12181,7 @@ const FeatureEntry kFeatureEntries[] = {
flag_descriptions::kEnableWebAppUpdateTokenParsingDescription, kOsAll,
FEATURE_VALUE_TYPE(features::kWebAppEnableUpdateTokenParsing)},
@ -368,7 +368,7 @@
{"root-scrollbar-follows-browser-theme",
flag_descriptions::kRootScrollbarFollowsTheme,
flag_descriptions::kRootScrollbarFollowsThemeDescription,
@@ -11921,7 +11951,7 @@ const FeatureEntry kFeatureEntries[] = {
@@ -12180,7 +12210,7 @@ const FeatureEntry kFeatureEntries[] = {
#endif // BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \

View file

@ -1,4 +1,4 @@
--- chrome/browser/background/glic/glic_status_icon.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/background/glic/glic_status_icon.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/background/glic/glic_status_icon.cc
@@ -86,7 +86,7 @@ GlicStatusIcon::GlicStatusIcon(GlicController* control
if (!status_icon_) {
@ -25,14 +25,14 @@
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
if (context_menu_) {
context_menu_->SetCommandIdVisible(IDC_GLIC_STATUS_ICON_MENU_EXIT,
BrowserList::GetInstance()->empty());
@@ -272,7 +272,7 @@ std::unique_ptr<StatusIconMenuModel> GlicStatusIcon::C
menu->AddItem(
IDC_GLIC_STATUS_ICON_MENU_REMOVE_ICON,
l10n_util::GetStringUTF16(IDS_GLIC_STATUS_ICON_MENU_REMOVE_ICON));
const bool is_visible = BrowserList::GetInstance()->empty();
const std::optional<size_t> index =
@@ -284,7 +284,7 @@ std::unique_ptr<StatusIconMenuModel> GlicStatusIcon::C
menu->AddItem(IDC_GLIC_STATUS_ICON_MENU_SETTINGS,
l10n_util::GetStringUTF16(IDS_GLIC_STATUS_ICON_MENU_SETTINGS));
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
menu->AddSeparator(ui::NORMAL_SEPARATOR);
menu->AddItem(IDC_GLIC_STATUS_ICON_MENU_EXIT,
l10n_util::GetStringUTF16(IDS_GLIC_STATUS_ICON_MENU_EXIT));
#endif

View file

@ -1,6 +1,6 @@
--- chrome/browser/browser_process_impl.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/browser_process_impl.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/browser_process_impl.cc
@@ -259,7 +259,7 @@
@@ -260,7 +260,7 @@
#include "components/enterprise/browser/controller/chrome_browser_cloud_management_controller.h"
#endif
@ -9,7 +9,7 @@
#include "chrome/browser/browser_features.h"
#include "components/os_crypt/async/browser/fallback_linux_key_provider.h"
#include "components/os_crypt/async/browser/freedesktop_secret_key_provider.h"
@@ -271,7 +271,7 @@
@@ -272,7 +272,7 @@
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
#endif
@ -18,7 +18,7 @@
// How often to check if the persistent instance of Chrome needs to restart
// to install an update.
static const int kUpdateCheckIntervalHours = 6;
@@ -1145,7 +1145,7 @@ void BrowserProcessImpl::RegisterPrefs(PrefRegistrySim
@@ -1167,7 +1167,7 @@ void BrowserProcessImpl::RegisterPrefs(PrefRegistrySim
GoogleUpdateSettings::GetCollectStatsConsent());
registry->RegisterBooleanPref(prefs::kDevToolsRemoteDebuggingAllowed, true);
@ -27,7 +27,7 @@
os_crypt_async::SecretPortalKeyProvider::RegisterLocalPrefs(registry);
#endif
}
@@ -1413,7 +1413,7 @@ void BrowserProcessImpl::PreMainMessageLoopRun() {
@@ -1435,7 +1435,7 @@ void BrowserProcessImpl::PreMainMessageLoopRun() {
local_state())));
#endif // BUILDFLAG(IS_WIN)
@ -36,7 +36,7 @@
base::CommandLine* cmd_line = base::CommandLine::ForCurrentProcess();
if (cmd_line->GetSwitchValueASCII(password_manager::kPasswordStore) !=
"basic") {
@@ -1682,7 +1682,7 @@ void BrowserProcessImpl::Unpin() {
@@ -1719,7 +1719,7 @@ void BrowserProcessImpl::Unpin() {
}
// Mac is currently not supported.

View file

@ -1,6 +1,6 @@
--- chrome/browser/browser_process_impl.h.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/browser_process_impl.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/browser_process_impl.h
@@ -408,7 +408,7 @@ class BrowserProcessImpl : public BrowserProcess,
@@ -416,7 +416,7 @@ class BrowserProcessImpl : public BrowserProcess,
std::unique_ptr<BatteryMetrics> battery_metrics_;

View file

@ -1,6 +1,6 @@
--- chrome/browser/chrome_browser_field_trials.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/chrome_browser_field_trials.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_browser_field_trials.cc
@@ -37,7 +37,7 @@
@@ -38,7 +38,7 @@
#include "chromeos/ash/services/multidevice_setup/public/cpp/first_run_field_trial.h"
#endif
@ -9,7 +9,7 @@
#include "base/nix/xdg_util.h"
#include "ui/base/ui_base_features.h"
#endif // BUILDFLAG(IS_LINUX)
@@ -117,7 +117,7 @@ void ChromeBrowserFieldTrials::RegisterSyntheticTrials
@@ -118,7 +118,7 @@ void ChromeBrowserFieldTrials::RegisterSyntheticTrials
#endif // BUILDFLAG(IS_ANDROID)
}

View file

@ -1,6 +1,6 @@
--- chrome/browser/chrome_browser_interface_binders.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/chrome_browser_interface_binders.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_browser_interface_binders.cc
@@ -77,7 +77,7 @@
@@ -81,7 +81,7 @@
#endif // BUILDFLAG(ENABLE_UNHANDLED_TAP)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -9,7 +9,7 @@
#include "chrome/browser/screen_ai/screen_ai_service_router.h"
#include "chrome/browser/screen_ai/screen_ai_service_router_factory.h"
#include "chrome/browser/ui/web_applications/sub_apps_service_impl.h"
@@ -358,7 +358,7 @@ void BindMediaFoundationPreferences(
@@ -363,7 +363,7 @@ void BindMediaFoundationPreferences(
#endif // BUILDFLAG(IS_WIN)
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -18,7 +18,7 @@
void BindScreenAIAnnotator(
content::RenderFrameHost* frame_host,
mojo::PendingReceiver<screen_ai::mojom::ScreenAIAnnotator> receiver) {
@@ -500,7 +500,7 @@ void PopulateChromeFrameBinders(
@@ -520,7 +520,7 @@ void PopulateChromeFrameBinders(
#endif // BUILDFLAG(ENABLE_SPEECH_SERVICE)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \

View file

@ -1,6 +1,6 @@
--- chrome/browser/chrome_browser_interface_binders_webui.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/chrome_browser_interface_binders_webui.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_browser_interface_binders_webui.cc
@@ -47,7 +47,7 @@
@@ -48,20 +48,20 @@
#include "content/public/browser/web_ui_controller_interface_binder.h"
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -8,17 +8,23 @@
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_BSD)
#include "chrome/browser/ui/webui/connectors_internals/connectors_internals.mojom.h"
#include "chrome/browser/ui/webui/connectors_internals/connectors_internals_ui.h"
#include "chrome/browser/ui/webui/discards/discards.mojom.h"
@@ -56,7 +56,7 @@
#include "ui/webui/resources/cr_components/app_management/app_management.mojom.h"
#endif
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
- BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_DESKTOP_ANDROID)
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_DESKTOP_ANDROID) || BUILDFLAG(IS_BSD)
#include "chrome/browser/ui/webui/discards/discards.mojom.h"
#include "chrome/browser/ui/webui/discards/discards_ui.h"
#include "chrome/browser/ui/webui/discards/site_data.mojom.h"
#endif
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
#include "chrome/browser/ui/webui/app_settings/web_app_settings_ui.h"
#include "chrome/browser/ui/webui/on_device_translation_internals/on_device_translation_internals_ui.h"
#include "chrome/browser/ui/webui/signin/history_sync_optin/history_sync_optin.mojom.h"
@@ -445,7 +445,7 @@ void PopulateChromeWebUIFrameBinders(
@@ -452,7 +452,7 @@ void PopulateChromeWebUIFrameBinders(
#endif
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -27,7 +33,7 @@
RegisterWebUIControllerInterfaceBinder<
connectors_internals::mojom::PageHandler,
enterprise_connectors::ConnectorsInternalsUI>(map);
@@ -456,7 +456,7 @@ void PopulateChromeWebUIFrameBinders(
@@ -463,7 +463,7 @@ void PopulateChromeWebUIFrameBinders(
policy::DlpInternalsUI>(map);
#endif
@ -36,7 +42,7 @@
RegisterWebUIControllerInterfaceBinder<
app_management::mojom::PageHandlerFactory, WebAppSettingsUI>(map);
@@ -583,14 +583,14 @@ void PopulateChromeWebUIFrameBinders(
@@ -593,14 +593,14 @@ void PopulateChromeWebUIFrameBinders(
HistoryClustersSidePanelUI, NewTabPageUI, BookmarksSidePanelUI>(map);
}
@ -53,12 +59,12 @@
WhatsNewUI,
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
NewTabPageUI>(map);
@@ -1123,7 +1123,7 @@ void PopulateChromeWebUIFrameBinders(
@@ -1133,7 +1133,7 @@ void PopulateChromeWebUIFrameBinders(
#endif // BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
- BUILDFLAG(IS_CHROMEOS)
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_BSD)
- BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_DESKTOP_ANDROID)
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_DESKTOP_ANDROID) || BUILDFLAG(IS_BSD)
RegisterWebUIControllerInterfaceBinder<discards::mojom::DetailsProvider,
DiscardsUI>(map);

View file

@ -1,6 +1,6 @@
--- chrome/browser/chrome_browser_main.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/chrome_browser_main.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_browser_main.cc
@@ -149,7 +149,7 @@
@@ -150,7 +150,7 @@
#endif
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || \
@ -9,7 +9,7 @@
#include "sql/database.h"
#endif
@@ -175,11 +175,11 @@
@@ -176,11 +176,11 @@
#include "components/enterprise/browser/controller/chrome_browser_cloud_management_controller.h"
#endif // BUILDFLAG(IS_CHROMEOS)
@ -23,7 +23,7 @@
#include "chrome/browser/headless/headless_mode_metrics.h" // nogncheck
#include "chrome/browser/headless/headless_mode_util.h" // nogncheck
#include "chrome/browser/metrics/desktop_session_duration/desktop_session_duration_tracker.h"
@@ -190,7 +190,7 @@
@@ -191,7 +191,7 @@
#include "ui/gfx/switches.h"
#endif
@ -32,7 +32,7 @@
#include "chrome/browser/first_run/upgrade_util.h"
#endif
@@ -268,7 +268,7 @@
@@ -269,7 +269,7 @@
#include "chrome/browser/chrome_process_singleton.h"
#include "chrome/browser/ui/startup/startup_browser_creator.h"
@ -41,7 +41,7 @@
#include "base/nix/xdg_util.h"
#endif
#endif // BUILDFLAG(ENABLE_PROCESS_SINGLETON)
@@ -291,7 +291,7 @@
@@ -292,7 +292,7 @@
namespace {
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || \
@ -50,7 +50,7 @@
constexpr base::FilePath::CharType kMediaHistoryDatabaseName[] =
FILE_PATH_LITERAL("Media History");
@@ -442,7 +442,7 @@ void ProcessSingletonNotificationCallbackImpl(
@@ -443,7 +443,7 @@ void ProcessSingletonNotificationCallbackImpl(
}
#endif
@ -59,7 +59,7 @@
// Set the global activation token sent as a command line switch by another
// browser process. This also removes the switch after use to prevent any side
// effects of leaving it in the command line after this point.
@@ -1016,7 +1016,7 @@ int ChromeBrowserMainParts::PreCreateThreadsImpl() {
@@ -1021,7 +1021,7 @@ int ChromeBrowserMainParts::PreCreateThreadsImpl() {
browser_creator_->AddFirstRunTabs(master_prefs_->new_tabs);
}
@ -68,7 +68,7 @@
// Create directory for user-level Native Messaging manifest files. This
// makes it less likely that the directory will be created by third-party
// software with incorrect owner or permission. See crbug.com/725513 .
@@ -1061,7 +1061,7 @@ int ChromeBrowserMainParts::PreCreateThreadsImpl() {
@@ -1066,7 +1066,7 @@ int ChromeBrowserMainParts::PreCreateThreadsImpl() {
#endif // BUILDFLAG(IS_MAC)
@ -77,7 +77,7 @@
metrics::DesktopSessionDurationTracker::Initialize();
ProfileActivityMetricsRecorder::Initialize();
TouchModeStatsTracker::Initialize(
@@ -1257,7 +1257,7 @@ void ChromeBrowserMainParts::PostProfileInit(Profile*
@@ -1262,7 +1262,7 @@ void ChromeBrowserMainParts::PostProfileInit(Profile*
#endif // BUILDFLAG(IS_WIN)
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || \
@ -86,7 +86,7 @@
// Delete the media history database if it still exists.
// TODO(crbug.com/40177301): Remove this.
base::ThreadPool::PostTask(
@@ -1305,7 +1305,7 @@ void ChromeBrowserMainParts::PostProfileInit(Profile*
@@ -1310,7 +1310,7 @@ void ChromeBrowserMainParts::PostProfileInit(Profile*
*UrlLanguageHistogramFactory::GetForBrowserContext(profile));
#endif
@ -95,7 +95,7 @@
if (headless::IsHeadlessMode()) {
headless::ReportHeadlessActionMetrics();
}
@@ -1414,7 +1414,7 @@ int ChromeBrowserMainParts::PreMainMessageLoopRunImpl(
@@ -1419,7 +1419,7 @@ int ChromeBrowserMainParts::PreMainMessageLoopRunImpl(
// In headless mode provide alternate SelectFileDialog factory overriding
// any platform specific SelectFileDialog implementation that may have been
// set.
@ -104,7 +104,7 @@
if (headless::IsHeadlessMode()) {
headless::HeadlessSelectFileDialogFactory::SetUp();
}
@@ -1959,7 +1959,7 @@ bool ChromeBrowserMainParts::ProcessSingletonNotificat
@@ -1964,7 +1964,7 @@ bool ChromeBrowserMainParts::ProcessSingletonNotificat
// Drop the request if headless mode is in effect or the request is from
// a headless Chrome process.

View file

@ -1,11 +1,11 @@
--- chrome/browser/chrome_browser_main_extra_parts_linux.cc.orig 2024-05-21 18:07:39 UTC
--- chrome/browser/chrome_browser_main_extra_parts_linux.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_browser_main_extra_parts_linux.cc
@@ -58,7 +58,7 @@ void ChromeBrowserMainExtraPartsLinux::PostBrowserStar
@@ -60,7 +60,7 @@ void ChromeBrowserMainExtraPartsLinux::PostBrowserStar
// static
void ChromeBrowserMainExtraPartsLinux::InitOzonePlatformHint() {
-#if BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
auto* const command_line = base::CommandLine::ForCurrentProcess();
auto env = base::Environment::Create();
std::string desktop_startup_id;
base::CommandLine* const command_line =
base::CommandLine::ForCurrentProcess();
std::unique_ptr<base::Environment> env = base::Environment::Create();

View file

@ -1,4 +1,4 @@
--- chrome/browser/chrome_content_browser_client.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/chrome_content_browser_client.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_content_browser_client.cc
@@ -506,7 +506,7 @@
#include "components/user_manager/user_manager.h"
@ -9,7 +9,7 @@
#include "chrome/browser/chrome_browser_main_linux.h"
#include "chrome/browser/ui/views/chrome_browser_main_extra_parts_views_linux.h"
#elif BUILDFLAG(IS_ANDROID)
@@ -622,11 +622,11 @@
@@ -621,11 +621,11 @@
#include "services/network/public/mojom/permissions_policy/permissions_policy_feature.mojom.h"
#endif // !BUILDFLAG(IS_ANDROID)
@ -23,7 +23,7 @@
#include "components/crash/core/app/crash_switches.h"
#include "components/crash/core/app/crashpad.h"
#endif
@@ -637,7 +637,7 @@
@@ -636,7 +636,7 @@
#include "chrome/browser/apps/link_capturing/web_app_link_capturing_delegate.h"
#endif
@ -32,16 +32,16 @@
#include "chrome/browser/enterprise/chrome_browser_main_extra_parts_enterprise.h"
#include "chrome/browser/enterprise/profile_management/oidc_auth_response_capture_navigation_throttle.h"
#include "chrome/browser/enterprise/profile_management/profile_management_navigation_throttle.h"
@@ -646,7 +646,7 @@
@@ -647,7 +647,7 @@
#endif
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
- BUILDFLAG(IS_CHROMEOS)
+ BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_BSD)
#include "chrome/browser/enterprise/connectors/device_trust/navigation_throttle.h"
#include "chrome/browser/enterprise/incognito/incognito_navigation_throttle.h"
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) ||
// BUILDFLAG(IS_CHROMEOS)
@@ -655,7 +655,7 @@
@@ -657,7 +657,7 @@
#include "chrome/browser/ui/views/chrome_browser_main_extra_parts_views.h"
#endif
@ -50,7 +50,7 @@
#include "chrome/browser/chrome_browser_main_extra_parts_linux.h"
#elif BUILDFLAG(IS_OZONE)
#include "chrome/browser/chrome_browser_main_extra_parts_ozone.h"
@@ -1549,7 +1549,7 @@ void ChromeContentBrowserClient::RegisterLocalStatePre
@@ -1558,7 +1558,7 @@ void ChromeContentBrowserClient::RegisterLocalStatePre
registry->RegisterBooleanPref(prefs::kDeviceNativeClientForceAllowedCache,
false);
#endif // BUILDFLAG(IS_CHROMEOS)
@ -59,7 +59,16 @@
registry->RegisterBooleanPref(prefs::kOutOfProcessSystemDnsResolutionEnabled,
true);
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID)
@@ -1758,7 +1758,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
@@ -1651,7 +1651,7 @@ void ChromeContentBrowserClient::RegisterProfilePrefs(
policy::policy_prefs::kForcePermissionPolicyUnloadDefaultEnabled, false);
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || \
- BUILDFLAG(IS_LINUX)
+ BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
registry->RegisterListPref(prefs::kMandatoryExtensionsForIncognitoNavigation);
#endif
@@ -1775,7 +1775,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
#elif BUILDFLAG(IS_CHROMEOS)
main_parts = std::make_unique<ash::ChromeBrowserMainPartsAsh>(
is_integration_test, &startup_data_);
@ -68,7 +77,7 @@
main_parts = std::make_unique<ChromeBrowserMainPartsLinux>(
is_integration_test, &startup_data_);
#elif BUILDFLAG(IS_ANDROID)
@@ -1787,7 +1787,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
@@ -1804,7 +1804,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
// Construct additional browser parts. Stages are called in the order in
// which they are added.
#if defined(TOOLKIT_VIEWS)
@ -77,7 +86,7 @@
main_parts->AddParts(
std::make_unique<ChromeBrowserMainExtraPartsViewsLinux>());
#else
@@ -1804,7 +1804,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
@@ -1821,7 +1821,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
main_parts->AddParts(std::make_unique<ChromeBrowserMainExtraPartsAsh>());
#endif
@ -86,7 +95,7 @@
main_parts->AddParts(std::make_unique<ChromeBrowserMainExtraPartsLinux>());
#elif BUILDFLAG(IS_OZONE)
main_parts->AddParts(std::make_unique<ChromeBrowserMainExtraPartsOzone>());
@@ -1823,7 +1823,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
@@ -1840,7 +1840,7 @@ ChromeContentBrowserClient::CreateBrowserMainParts(boo
chrome::AddMetricsExtraParts(main_parts.get());
@ -95,7 +104,7 @@
main_parts->AddParts(
std::make_unique<
enterprise_util::ChromeBrowserMainExtraPartsEnterprise>());
@@ -2706,7 +2706,9 @@ void MaybeAppendBlinkSettingsSwitchForFieldTrial(
@@ -2744,7 +2744,9 @@ void MaybeAppendBlinkSettingsSwitchForFieldTrial(
void ChromeContentBrowserClient::AppendExtraCommandLineSwitches(
base::CommandLine* command_line,
int child_process_id) {
@ -105,7 +114,7 @@
#if BUILDFLAG(IS_MAC)
std::unique_ptr<metrics::ClientInfo> client_info =
GoogleUpdateSettings::LoadMetricsClientInfo();
@@ -2715,7 +2717,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLin
@@ -2753,7 +2755,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLin
client_info->client_id);
}
#elif BUILDFLAG(IS_POSIX)
@ -114,7 +123,7 @@
pid_t pid;
if (crash_reporter::GetHandlerSocket(nullptr, &pid)) {
command_line->AppendSwitchASCII(
@@ -3080,7 +3082,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLin
@@ -3117,7 +3119,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLin
}
}
@ -123,7 +132,7 @@
// Opt into a hardened stack canary mitigation if it hasn't already been
// force-disabled.
if (!browser_command_line.HasSwitch(switches::kChangeStackGuardOnFork)) {
@@ -4030,7 +4032,7 @@ bool UpdatePreferredColorScheme(WebPreferences* web_pr
@@ -4067,7 +4069,7 @@ bool UpdatePreferredColorScheme(WebPreferences* web_pr
return old_preferred_color_scheme != web_prefs->preferred_color_scheme;
}
@ -132,7 +141,7 @@
// Sets the `root_scrollbar_theme_color` web pref if the user has enabled a
// custom colored frame for the UI.
void UpdateRootScrollbarThemeColor(Profile* profile,
@@ -4657,7 +4659,7 @@ void ChromeContentBrowserClient::OverrideWebPreference
@@ -4697,7 +4699,7 @@ void ChromeContentBrowserClient::OverrideWebPreference
UpdatePreferredColorScheme(web_prefs, main_frame_site.GetSiteURL(),
web_contents, GetWebTheme());
@ -141,7 +150,7 @@
UpdateRootScrollbarThemeColor(profile, web_contents, web_prefs);
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN)
@@ -4973,7 +4975,7 @@ void ChromeContentBrowserClient::GetAdditionalFileSyst
@@ -5017,7 +5019,7 @@ void ChromeContentBrowserClient::GetAdditionalFileSyst
}
}
@ -150,7 +159,7 @@
void ChromeContentBrowserClient::GetAdditionalMappedFilesForChildProcess(
const base::CommandLine& command_line,
int child_process_id,
@@ -5485,7 +5487,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
@@ -5529,7 +5531,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
&throttles);
}
@ -159,7 +168,7 @@
MaybeAddThrottle(
WebAppSettingsNavigationThrottle::MaybeCreateThrottleFor(handle),
&throttles);
@@ -5502,7 +5504,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
@@ -5553,7 +5555,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -168,7 +177,7 @@
MaybeAddThrottle(enterprise_connectors::DeviceTrustNavigationThrottle::
MaybeCreateThrottleFor(handle),
&throttles);
@@ -5543,7 +5545,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
@@ -5594,7 +5596,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
}
#endif
@ -177,7 +186,16 @@
MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
MaybeCreateThrottleFor(handle),
&throttles);
@@ -7496,7 +7498,7 @@ bool ChromeContentBrowserClient::ShouldSandboxNetworkS
@@ -5716,7 +5718,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigati
&throttles);
#endif // BUILDFLAG(IS_CHROMEOS)
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
if (profile && profile->IsIncognitoProfile() && profile->IsOffTheRecord()) {
MaybeAddThrottle(enterprise_incognito::IncognitoNavigationThrottle::
MaybeCreateThrottleFor(handle),
@@ -7544,7 +7546,7 @@ bool ChromeContentBrowserClient::ShouldSandboxNetworkS
bool ChromeContentBrowserClient::ShouldRunOutOfProcessSystemDnsResolution() {
// This enterprise policy is supported on Android, but the feature will not be
// launched there.

View file

@ -1,6 +1,6 @@
--- chrome/browser/chrome_content_browser_client.h.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/chrome_content_browser_client.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/chrome_content_browser_client.h
@@ -555,7 +555,7 @@ class ChromeContentBrowserClient : public content::Con
@@ -560,7 +560,7 @@ class ChromeContentBrowserClient : public content::Con
bool IsPluginAllowedToUseDevChannelAPIs(
content::BrowserContext* browser_context,
const GURL& url) override;

View file

@ -1,6 +1,6 @@
--- chrome/browser/component_updater/iwa_key_distribution_component_installer.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/component_updater/iwa_key_distribution_component_installer.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/component_updater/iwa_key_distribution_component_installer.cc
@@ -64,7 +64,7 @@ component_updater::OnDemandUpdater::Priority GetOnDema
@@ -77,7 +77,7 @@ bool IsOnDemandUpdateSupported() {
namespace component_updater {
@ -9,7 +9,7 @@
BASE_FEATURE(kIwaKeyDistributionComponent,
"IwaKeyDistributionComponent",
#if BUILDFLAG(IS_CHROMEOS)
@@ -89,7 +89,7 @@ bool IwaKeyDistributionComponentInstallerPolicy::IsSup
@@ -102,7 +102,7 @@ bool IwaKeyDistributionComponentInstallerPolicy::IsSup
// the main IWA feature.
#if BUILDFLAG(IS_WIN)
return base::FeatureList::IsEnabled(features::kIsolatedWebApps);

View file

@ -1,15 +1,24 @@
--- chrome/browser/component_updater/wasm_tts_engine_component_installer.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/component_updater/wasm_tts_engine_component_installer.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/component_updater/wasm_tts_engine_component_installer.cc
@@ -8,7 +8,7 @@
#include "base/functional/callback.h"
@@ -9,7 +9,7 @@
#include "base/logging.h"
#include "content/public/browser/browser_thread.h"
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
#include "chrome/browser/accessibility/embedded_a11y_extension_loader.h"
#include "chrome/common/extensions/extension_constants.h"
#include "components/crx_file/id_util.h"
@@ -70,7 +70,7 @@ void WasmTtsEngineComponentInstallerPolicy::ComponentR
#include "ui/accessibility/accessibility_features.h"
@@ -41,7 +41,7 @@ constexpr std::array<uint8_t, 32> kWasmTtsEnginePublic
const char kWasmTtsEngineManifestName[] = "WASM TTS Engine";
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
class WasmTTSEngineDirectory {
public:
static WasmTTSEngineDirectory* Get() {
@@ -111,7 +111,7 @@ void WasmTtsEngineComponentInstallerPolicy::ComponentR
VLOG(1) << "Component ready, version " << version.GetString() << " in "
<< install_dir.value();
@ -17,13 +26,13 @@
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
if (features::IsWasmTtsComponentUpdaterEnabled() &&
!features::IsWasmTtsEngineAutoInstallDisabled()) {
EmbeddedA11yExtensionLoader::GetInstance()->Init();
@@ -121,7 +121,7 @@ void RegisterWasmTtsEngineComponent(ComponentUpdateSer
installer->Register(cus, base::OnceClosure());
}
// Instead of installing the component extension as soon as it is ready,
@@ -166,7 +166,7 @@ void RegisterWasmTtsEngineComponent(ComponentUpdateSer
void WasmTtsEngineComponentInstallerPolicy::GetWasmTTSEngineDirectory(
base::OnceCallback<void(const base::FilePath&)> callback) {
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
std::string WasmTtsEngineComponentInstallerPolicy::GetId() {
return crx_file::id_util::GenerateIdFromHash((kWasmTtsEnginePublicKeySHA256));
}
WasmTTSEngineDirectory* wasm_directory = WasmTTSEngineDirectory::Get();
wasm_directory->Get(std::move(callback));
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)

View file

@ -1,11 +0,0 @@
--- chrome/browser/component_updater/wasm_tts_engine_component_installer.h.orig 2025-04-04 08:52:13 UTC
+++ chrome/browser/component_updater/wasm_tts_engine_component_installer.h
@@ -27,7 +27,7 @@ class WasmTtsEngineComponentInstallerPolicy : public C
WasmTtsEngineComponentInstallerPolicy& operator=(
const WasmTtsEngineComponentInstallerPolicy&) = delete;
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
static std::string GetId();
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)

View file

@ -1,8 +1,8 @@
--- chrome/browser/devtools/features.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/devtools/features.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/devtools/features.cc
@@ -157,7 +157,7 @@ BASE_FEATURE(kDevToolsAiGeneratedTimelineLabels,
"DevToolsAiGeneratedTimelineLabels",
base::FEATURE_DISABLED_BY_DEFAULT);
@@ -164,7 +164,7 @@ BASE_FEATURE(kDevToolsNewPermissionDialog,
"DevToolsNewPermissionDialog",
base::FEATURE_ENABLED_BY_DEFAULT);
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)

View file

@ -1,8 +1,8 @@
--- chrome/browser/devtools/features.h.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/devtools/features.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/devtools/features.h
@@ -89,7 +89,7 @@ BASE_DECLARE_FEATURE(kDevToolsCssValueTracing);
@@ -92,7 +92,7 @@ BASE_DECLARE_FEATURE(kDevToolsAiGeneratedTimelineLabel
BASE_DECLARE_FEATURE(kDevToolsAiGeneratedTimelineLabels);
BASE_DECLARE_FEATURE(kDevToolsNewPermissionDialog);
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)

View file

@ -1,6 +1,6 @@
--- chrome/browser/download/chrome_download_manager_delegate.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/download/chrome_download_manager_delegate.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/download/chrome_download_manager_delegate.cc
@@ -1864,7 +1864,7 @@ void ChromeDownloadManagerDelegate::OnDownloadTargetDe
@@ -1889,7 +1889,7 @@ void ChromeDownloadManagerDelegate::OnDownloadTargetDe
bool ChromeDownloadManagerDelegate::IsOpenInBrowserPreferredForFile(
const base::FilePath& path) {
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || \
@ -9,7 +9,7 @@
if (path.MatchesExtension(FILE_PATH_LITERAL(".pdf"))) {
return !download_prefs_->ShouldOpenPdfInSystemReader();
}
@@ -2000,7 +2000,7 @@ void ChromeDownloadManagerDelegate::CheckDownloadAllow
@@ -2025,7 +2025,7 @@ void ChromeDownloadManagerDelegate::CheckDownloadAllow
content::CheckDownloadAllowedCallback check_download_allowed_cb) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || \
@ -18,7 +18,7 @@
// Don't download pdf if it is a file URL, as that might cause an infinite
// download loop if Chrome is not the system pdf viewer.
if (url.SchemeIsFile() && download_prefs_->ShouldOpenPdfInSystemReader()) {
@@ -2082,7 +2082,7 @@ void ChromeDownloadManagerDelegate::CheckSavePackageAl
@@ -2107,7 +2107,7 @@ void ChromeDownloadManagerDelegate::CheckSavePackageAl
DCHECK(download_item->IsSavePackageDownload());
#if (BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || \

View file

@ -1,4 +1,4 @@
--- chrome/browser/download/download_item_model.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/download/download_item_model.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/download/download_item_model.cc
@@ -772,7 +772,7 @@ bool DownloadItemModel::IsCommandChecked(
download_crx_util::IsExtensionDownload(*download_);
@ -18,7 +18,7 @@
if (download_commands->CanOpenPdfInSystemViewer()) {
prefs->SetShouldOpenPdfInSystemReader(!is_checked);
SetShouldPreferOpeningInBrowser(is_checked);
@@ -1206,7 +1206,7 @@ void DownloadItemModel::DetermineAndSetShouldPreferOpe
@@ -1210,7 +1210,7 @@ void DownloadItemModel::DetermineAndSetShouldPreferOpe
return;
}

View file

@ -0,0 +1,38 @@
--- chrome/browser/enterprise/browser_management/browser_management_service.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/browser_management/browser_management_service.cc
@@ -50,7 +50,7 @@ GetManagementStatusProviders(Profile* profile) {
BrowserManagementService::BrowserManagementService(Profile* profile)
: ManagementService(GetManagementStatusProviders(profile)) {
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
base::SequencedTaskRunner::GetCurrentDefault()->PostTask(
FROM_HERE,
base::BindOnce(&BrowserManagementService::UpdateManagementIconForProfile,
@@ -70,7 +70,7 @@ BrowserManagementService::BrowserManagementService(Pro
}
ui::ImageModel* BrowserManagementService::GetManagementIconForProfile() {
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) | BUILDFLAG(IS_BSD)
return management_icon_for_profile_.IsEmpty() ? nullptr
: &management_icon_for_profile_;
#else
@@ -83,7 +83,7 @@ void BrowserManagementService::TriggerPolicyStatusChan
OnPolicyStatusChanged();
}
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
void BrowserManagementService::StartListeningToPrefChanges(Profile* profile) {
pref_change_registrar_.Init(profile->GetPrefs());
pref_change_registrar_.Add(
@@ -126,7 +126,7 @@ void BrowserManagementService::SetManagementIconForPro
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
void BrowserManagementService::OnPolicyStatusChanged() {
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
NotifyEnterpriseLabelUpdated();
#endif
}

View file

@ -0,0 +1,11 @@
--- chrome/browser/enterprise/browser_management/browser_management_service.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/browser_management/browser_management_service.h
@@ -44,7 +44,7 @@ class BrowserManagementService : public ManagementServ
// PolicyStatusProvider::Observer:
void OnPolicyStatusChanged() override;
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
// Starts listening to changes to policies that affect the enterprise label
// and pill.
void StartListeningToPrefChanges(Profile* profile);

View file

@ -1,6 +1,6 @@
--- chrome/browser/enterprise/connectors/reporting/crash_reporting_context.cc.orig 2024-09-30 07:45:04 UTC
--- chrome/browser/enterprise/connectors/reporting/crash_reporting_context.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/connectors/reporting/crash_reporting_context.cc
@@ -20,7 +20,7 @@
@@ -24,7 +24,7 @@
namespace enterprise_connectors {

View file

@ -1,6 +1,6 @@
--- chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
@@ -53,7 +53,7 @@
@@ -52,7 +52,7 @@
#include "base/strings/utf_string_conversions.h"
#endif
@ -9,7 +9,7 @@
#include "chrome/browser/enterprise/signals/signals_aggregator_factory.h"
#include "chrome/browser/enterprise/signin/enterprise_signin_prefs.h"
#include "components/device_signals/core/browser/signals_aggregator.h"
@@ -158,7 +158,7 @@ void RealtimeReportingClient::ReportPastEvent(const st
@@ -157,7 +157,7 @@ void RealtimeReportingClient::ReportPastEvent(const st
/*include_profile_user_name=*/false);
}
@ -18,7 +18,7 @@
void AddCrowdstrikeSignalsToEvent(
base::Value::Dict& event,
@@ -194,7 +194,7 @@ std::string RealtimeReportingClient::GetProfileUserNam
@@ -193,7 +193,7 @@ std::string RealtimeReportingClient::GetProfileUserNam
username_ =
identity_manager_ ? GetProfileEmail(identity_manager_) : std::string();
@ -27,7 +27,7 @@
if (username_.empty()) {
username_ = Profile::FromBrowserContext(context_)->GetPrefs()->GetString(
enterprise_signin::prefs::kProfileUserEmail);
@@ -246,7 +246,7 @@ std::string RealtimeReportingClient::GetBrowserClientI
@@ -245,7 +245,7 @@ std::string RealtimeReportingClient::GetBrowserClientI
return client_id;
}

View file

@ -0,0 +1,20 @@
--- chrome/browser/enterprise/reporting/cloud_profile_reporting_service.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/reporting/cloud_profile_reporting_service.cc
@@ -34,7 +34,7 @@
#include "extensions/buildflags/buildflags.h"
#include "services/network/public/cpp/shared_url_loader_factory.h"
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
#include "chrome/browser/enterprise/signals/signals_aggregator_factory.h"
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
@@ -113,7 +113,7 @@ void CloudProfileReportingService::CreateReportSchedul
params.profile_request_generator =
std::make_unique<ChromeProfileRequestGenerator>(
profile_->GetPath(), &delegate_factory,
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
enterprise_signals::SignalsAggregatorFactory::GetForProfile(
profile_));
#else

View file

@ -0,0 +1,20 @@
--- chrome/browser/enterprise/reporting/cloud_profile_reporting_service_factory.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/reporting/cloud_profile_reporting_service_factory.cc
@@ -10,7 +10,7 @@
#include "components/enterprise/browser/reporting/report_scheduler.h"
#include "services/network/public/cpp/shared_url_loader_factory.h"
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_BSD)
#include "chrome/browser/enterprise/signals/signals_aggregator_factory.h"
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
@@ -47,7 +47,7 @@ CloudProfileReportingServiceFactory::CloudProfileRepor
ProfileSelections::BuildForRegularProfile()) {
DependsOn(enterprise::ProfileIdServiceFactory::GetInstance());
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
// Depends on this service because
// `CloudProfileReportingService.profile_request_generator_` has a dependency
// on it.

View file

@ -1,6 +1,6 @@
--- chrome/browser/enterprise/signals/context_info_fetcher.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/enterprise/signals/context_info_fetcher.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/signals/context_info_fetcher.cc
@@ -179,6 +179,8 @@ std::vector<std::string> ContextInfoFetcher::GetOnSecu
@@ -181,6 +181,8 @@ std::vector<std::string> ContextInfoFetcher::GetOnSecu
SettingValue ContextInfoFetcher::GetOSFirewall() {
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
return device_signals::GetOSFirewall();
@ -9,7 +9,7 @@
#elif BUILDFLAG(IS_CHROMEOS)
return GetChromeosFirewall();
#else
@@ -198,7 +200,7 @@ ScopedUfwConfigPathForTesting::~ScopedUfwConfigPathFor
@@ -200,7 +202,7 @@ ScopedUfwConfigPathForTesting::~ScopedUfwConfigPathFor
#endif // BUILDFLAG(IS_LINUX)
std::vector<std::string> ContextInfoFetcher::GetDnsServers() {

View file

@ -1,4 +1,4 @@
--- chrome/browser/enterprise/util/managed_browser_utils.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/enterprise/util/managed_browser_utils.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/enterprise/util/managed_browser_utils.cc
@@ -222,7 +222,7 @@ void SetUserAcceptedAccountManagement(Profile* profile
profile_manager->GetProfileAttributesStorage()
@ -9,3 +9,12 @@
SetEnterpriseProfileLabel(profile);
#endif
entry->SetUserAcceptedAccountManagement(accepted);
@@ -341,7 +341,7 @@ bool CanShowEnterpriseProfileUI(Profile* profile) {
}
bool CanShowEnterpriseBadgingForNTPFooter(Profile* profile) {
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
auto* management_service =
policy::ManagementServiceFactory::GetForProfile(profile);

View file

@ -1,6 +1,6 @@
--- chrome/browser/extensions/BUILD.gn.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/extensions/BUILD.gn.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/BUILD.gn
@@ -1464,6 +1464,10 @@ source_set("extensions") {
@@ -1468,6 +1468,10 @@ source_set("extensions") {
deps += [ "//chrome/services/printing/public/mojom" ]
}

View file

@ -1,4 +1,4 @@
--- chrome/browser/extensions/api/enterprise_reporting_private/chrome_desktop_report_request_helper.cc.orig 2024-01-30 07:53:34 UTC
--- chrome/browser/extensions/api/enterprise_reporting_private/chrome_desktop_report_request_helper.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/api/enterprise_reporting_private/chrome_desktop_report_request_helper.cc
@@ -24,7 +24,7 @@
#include "base/win/registry.h"
@ -9,7 +9,7 @@
#include "base/environment.h"
#include "base/nix/xdg_util.h"
#endif
@@ -255,7 +255,7 @@ base::FilePath GetEndpointVerificationDir() {
@@ -264,7 +264,7 @@ base::FilePath GetEndpointVerificationDir() {
bool got_path = false;
#if BUILDFLAG(IS_WIN)
got_path = base::PathService::Get(base::DIR_LOCAL_APP_DATA, &path);
@ -18,7 +18,7 @@
std::unique_ptr<base::Environment> env(base::Environment::Create());
path = base::nix::GetXDGDirectory(env.get(), base::nix::kXdgConfigHomeEnvVar,
base::nix::kDotConfigDir);
@@ -266,7 +266,7 @@ base::FilePath GetEndpointVerificationDir() {
@@ -275,7 +275,7 @@ base::FilePath GetEndpointVerificationDir() {
if (!got_path)
return path;

View file

@ -1,11 +0,0 @@
--- chrome/browser/extensions/api/management/chrome_management_api_delegate.cc.orig 2025-05-05 10:57:53 UTC
+++ chrome/browser/extensions/api/management/chrome_management_api_delegate.cc
@@ -410,7 +410,7 @@ bool ChromeManagementAPIDelegate::LaunchAppFunctionDel
apps::LaunchContainer launch_container =
GetLaunchContainer(extensions::ExtensionPrefs::Get(context), extension);
Profile* profile = Profile::FromBrowserContext(context);
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
if (extensions::IsExtensionUnsupportedDeprecatedApp(profile,
extension->id())) {
return false;

View file

@ -1,6 +1,6 @@
--- chrome/browser/extensions/api/runtime/chrome_runtime_api_delegate.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/extensions/api/runtime/chrome_runtime_api_delegate.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/api/runtime/chrome_runtime_api_delegate.cc
@@ -292,7 +292,9 @@ bool ChromeRuntimeAPIDelegate::GetPlatformInfo(Platfor
@@ -288,7 +288,9 @@ bool ChromeRuntimeAPIDelegate::GetPlatformInfo(Platfor
} else if (strcmp(os, "linux") == 0) {
info->os = extensions::api::runtime::PlatformOs::kLinux;
} else if (strcmp(os, "openbsd") == 0) {

View file

@ -1,4 +1,4 @@
--- chrome/browser/extensions/api/settings_private/prefs_util.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/extensions/api/settings_private/prefs_util.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/api/settings_private/prefs_util.cc
@@ -196,7 +196,7 @@ const PrefsUtil::TypedPrefMap& PrefsUtil::GetAllowlist
(*s_allowlist)[autofill::prefs::kAutofillPaymentCardBenefits] =
@ -18,7 +18,7 @@
(*s_allowlist)[::prefs::kUseCustomChromeFrame] =
settings_api::PrefType::kBoolean;
#endif
@@ -226,7 +226,7 @@ const PrefsUtil::TypedPrefMap& PrefsUtil::GetAllowlist
@@ -228,7 +228,7 @@ const PrefsUtil::TypedPrefMap& PrefsUtil::GetAllowlist
(*s_allowlist)[::prefs::kCurrentThemeID] = settings_api::PrefType::kString;
(*s_allowlist)[::prefs::kPinnedActions] = settings_api::PrefType::kList;
(*s_allowlist)[::prefs::kPolicyThemeColor] = settings_api::PrefType::kNumber;

View file

@ -1,6 +1,6 @@
--- chrome/browser/extensions/api/tabs/tabs_api.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/extensions/api/tabs/tabs_api.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/api/tabs/tabs_api.cc
@@ -932,7 +932,7 @@ ExtensionFunction::ResponseAction WindowsCreateFunctio
@@ -945,7 +945,7 @@ ExtensionFunction::ResponseAction WindowsCreateFunctio
// created as minimized.
// TODO(crbug.com/40254339): Remove this workaround when linux is fixed.
// TODO(crbug.com/40254339): Find a fix for wayland as well.

View file

@ -1,6 +1,6 @@
--- chrome/browser/extensions/api/webstore_private/webstore_private_api.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/extensions/api/webstore_private/webstore_private_api.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
@@ -916,7 +916,7 @@ void WebstorePrivateBeginInstallWithManifest3Function:
@@ -914,7 +914,7 @@ void WebstorePrivateBeginInstallWithManifest3Function:
#if BUILDFLAG(IS_CHROMEOS)
RequestExtensionApproval(contents);
return;

View file

@ -1,6 +1,6 @@
--- chrome/browser/extensions/external_provider_impl.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/extensions/external_provider_impl.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/extensions/external_provider_impl.cc
@@ -818,7 +818,7 @@ void ExternalProviderImpl::CreateExternalProviders(
@@ -828,7 +828,7 @@ void ExternalProviderImpl::CreateExternalProviders(
#endif // BUILDFLAG(IS_CHROMEOS)
if (!profile->GetPrefs()->GetBoolean(pref_names::kBlockExternalExtensions)) {
@ -9,7 +9,7 @@
provider_list->push_back(std::make_unique<ExternalProviderImpl>(
service,
base::MakeRefCounted<ExternalPrefLoader>(
@@ -846,7 +846,7 @@ void ExternalProviderImpl::CreateExternalProviders(
@@ -856,7 +856,7 @@ void ExternalProviderImpl::CreateExternalProviders(
bundled_extension_creation_flags));
// Define a per-user source of external extensions.

View file

@ -1,11 +1,11 @@
--- chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
@@ -357,7 +357,7 @@ const struct {
FILE_PATH_LITERAL("Library/Mobile Documents/com~apple~CloudDocs"),
kDontBlockChildren},
@@ -341,7 +341,7 @@ GenerateBlockedPath() {
FILE_PATH_LITERAL("Library/Mobile Documents/com~apple~CloudDocs"),
BlockType::kDontBlockChildren},
#endif
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_BSD)
// On Linux also block access to devices via /dev.
{kNoBasePathKey, FILE_PATH_LITERAL("/dev"), kBlockAllChildren},
// And security sensitive data in /proc and /sys.
// On Linux also block access to devices via /dev.
{kNoBasePathKey, FILE_PATH_LITERAL("/dev"), BlockType::kBlockAllChildren},
// And security sensitive data in /proc and /sys.

View file

@ -1,6 +1,6 @@
--- chrome/browser/flag_descriptions.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/flag_descriptions.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/flag_descriptions.cc
@@ -602,7 +602,7 @@ const char kAutofillEnableAllowlistForBmoCardCategoryB
@@ -617,7 +617,7 @@ const char kAutofillEnableAllowlistForBmoCardCategoryB
"Autofill suggestions on the allowlisted merchant websites.";
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -9,7 +9,7 @@
const char kAutofillEnableAmountExtractionAllowlistDesktopName[] =
"Enable loading and querying the checkout amount extraction allowlist on "
"Chrome Desktop";
@@ -626,7 +626,7 @@ const char kAutofillEnableAmountExtractionDesktopLoggi
@@ -641,7 +641,7 @@ const char kAutofillEnableAmountExtractionDesktopLoggi
// BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -18,7 +18,7 @@
const char kAutofillEnableBuyNowPayLaterName[] =
"Enable buy now pay later on Autofill";
const char kAutofillEnableBuyNowPayLaterDescription[] =
@@ -1031,7 +1031,7 @@ const char kDevicePostureDescription[] =
@@ -1064,7 +1064,7 @@ const char kDevicePostureDescription[] =
"Enables Device Posture API (foldable devices)";
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -27,7 +27,7 @@
const char kDocumentPictureInPictureAnimateResizeName[] =
"Document Picture-in-Picture Animate Resize";
const char kDocumentPictureInPictureAnimateResizeDescription[] =
@@ -1123,7 +1123,7 @@ const char kContextMenuEmptySpaceDescription[] =
@@ -1178,7 +1178,7 @@ const char kContextMenuEmptySpaceDescription[] =
"space, a context menu containing page-related items will be shown.";
#endif // BUILDFLAG(IS_ANDROID)
@ -36,7 +36,7 @@
const char kContextualCueingName[] = "Contextual cueing";
const char kContextualCueingDescription[] =
"Enables the contextual cueing system to support showing actions.";
@@ -1563,7 +1563,7 @@ const char kEnableIsolatedWebAppDevModeName[] =
@@ -1604,7 +1604,7 @@ const char kEnableIsolatedWebAppDevModeName[] =
const char kEnableIsolatedWebAppDevModeDescription[] =
"Enables the installation of unverified Isolated Web Apps";
@ -45,7 +45,7 @@
const char kEnableIwaKeyDistributionComponentName[] =
"Enable the Iwa Key Distribution component";
const char kEnableIwaKeyDistributionComponentDescription[] =
@@ -3430,7 +3430,7 @@ const char kRetainOmniboxOnFocusDescription[] =
@@ -3536,7 +3536,7 @@ const char kRetainOmniboxOnFocusDescription[] =
"exhibit a change in behavior.";
#endif // BUILDFLAG(IS_ANDROID)
@ -54,7 +54,7 @@
const char kRootScrollbarFollowsTheme[] = "Make scrollbar follow theme";
const char kRootScrollbarFollowsThemeDescription[] =
"If enabled makes the root scrollbar follow the browser's theme color.";
@@ -3648,7 +3648,7 @@ const char kDefaultSiteInstanceGroupsDescription[] =
@@ -3774,7 +3774,7 @@ const char kDefaultSiteInstanceGroupsDescription[] =
"SiteInstance.";
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -63,7 +63,7 @@
const char kPwaNavigationCapturingName[] = "Desktop PWA Link Capturing";
const char kPwaNavigationCapturingDescription[] =
"Enables opening links from Chrome in an installed PWA. Currently under "
@@ -3863,7 +3863,7 @@ const char kTranslateForceTriggerOnEnglishDescription[
@@ -3990,7 +3990,7 @@ const char kTranslateForceTriggerOnEnglishDescription[
"Force the Translate Triggering on English pages experiment to be enabled "
"with the selected language model active.";
@ -72,7 +72,7 @@
const char kEnableHistorySyncOptinName[] = "History Sync Opt-in";
const char kEnableHistorySyncOptinDescription[] =
"Enables the History Sync Opt-in screen on Desktop platforms. The screen "
@@ -5451,7 +5451,7 @@ const char kTranslateOpenSettingsDescription[] =
@@ -5650,7 +5650,7 @@ const char kTranslateOpenSettingsDescription[] =
"Add an option to the translate bubble menu to open language settings.";
#endif
@ -81,7 +81,7 @@
const char kWasmTtsComponentUpdaterEnabledName[] =
"Enable Wasm TTS Extension Component";
const char kWasmTtsComponentUpdaterEnabledDescription[] =
@@ -7459,7 +7459,7 @@ const char kTetheringExperimentalFunctionalityDescript
@@ -7681,7 +7681,7 @@ const char kTetheringExperimentalFunctionalityDescript
#endif // BUILDFLAG(IS_CHROMEOS)
@ -90,7 +90,7 @@
const char kGetAllScreensMediaName[] = "GetAllScreensMedia API";
const char kGetAllScreensMediaDescription[] =
"When enabled, the getAllScreensMedia API for capturing multiple screens "
@@ -7688,7 +7688,7 @@ const char kEnableArmHwdrmDescription[] = "Enable HW b
@@ -7910,7 +7910,7 @@ const char kEnableArmHwdrmDescription[] = "Enable HW b
// Linux -----------------------------------------------------------------------
@ -99,7 +99,7 @@
const char kOzonePlatformHintChoiceDefault[] = "Default";
const char kOzonePlatformHintChoiceAuto[] = "Auto";
const char kOzonePlatformHintChoiceX11[] = "X11";
@@ -7738,6 +7738,18 @@ const char kWaylandUiScalingDescription[] =
@@ -7960,6 +7960,18 @@ const char kWaylandUiScalingDescription[] =
"Enable experimental support for text scaling in the Wayland backend "
"backed by full UI scaling. Requires #wayland-per-window-scaling to be "
"enabled too.";
@ -118,7 +118,7 @@
#endif // BUILDFLAG(IS_LINUX)
// Random platform combinations -----------------------------------------------
@@ -7750,7 +7762,7 @@ const char kZeroCopyVideoCaptureDescription[] =
@@ -7972,7 +7984,7 @@ const char kZeroCopyVideoCaptureDescription[] =
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -127,7 +127,7 @@
const char kFollowingFeedSidepanelName[] = "Following feed in the sidepanel";
const char kFollowingFeedSidepanelDescription[] =
"Enables the following feed in the sidepanel.";
@@ -7793,7 +7805,7 @@ const char kGroupPromoPrototypeName[] = "Group Promo P
@@ -8015,7 +8027,7 @@ const char kGroupPromoPrototypeName[] = "Group Promo P
const char kGroupPromoPrototypeDescription[] =
"Enables prototype for group promo.";
@ -136,7 +136,7 @@
const char kEnableNetworkServiceSandboxName[] =
"Enable the network service sandbox.";
const char kEnableNetworkServiceSandboxDescription[] =
@@ -7825,7 +7837,7 @@ const char kWebBluetoothConfirmPairingSupportDescripti
@@ -8043,7 +8055,7 @@ const char kWebBluetoothConfirmPairingSupportDescripti
"Bluetooth";
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)
@ -145,7 +145,7 @@
#if BUILDFLAG(ENABLE_PRINTING)
const char kCupsIppPrintingBackendName[] = "CUPS IPP Printing Backend";
const char kCupsIppPrintingBackendDescription[] =
@@ -7967,7 +7979,7 @@ const char kElementCaptureDescription[] =
@@ -8186,7 +8198,7 @@ const char kElementCaptureDescription[] =
"media track into a track capturing just a specific DOM element.";
#endif // !BUILDFLAG(IS_ANDROID)
@ -154,7 +154,7 @@
const char kUIDebugToolsName[] = "Debugging tools for UI";
const char kUIDebugToolsDescription[] =
"Enables additional keyboard shortcuts to help debugging.";
@@ -8018,7 +8030,7 @@ const char kComposeUpfrontInputModesDescription[] =
@@ -8237,7 +8249,7 @@ const char kComposeUpfrontInputModesDescription[] =
"Enables upfront input modes in the Compose dialog";
#endif // BUILDFLAG(ENABLE_COMPOSE)
@ -163,7 +163,7 @@
const char kThirdPartyProfileManagementName[] =
"Third party profile management";
const char kThirdPartyProfileManagementDescription[] =
@@ -8154,7 +8166,7 @@ const char kSupervisedUserBlockInterstitialV3Name[] =
@@ -8375,7 +8387,7 @@ const char kSupervisedUserBlockInterstitialV3Name[] =
const char kSupervisedUserBlockInterstitialV3Description[] =
"Enables URL filter interstitial V3 for Family Link users.";

View file

@ -1,6 +1,6 @@
--- chrome/browser/flag_descriptions.h.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/flag_descriptions.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/flag_descriptions.h
@@ -373,7 +373,7 @@ extern const char
@@ -383,7 +383,7 @@ extern const char
kAutofillEnableAllowlistForBmoCardCategoryBenefitsDescription[];
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -9,7 +9,7 @@
extern const char kAutofillEnableAmountExtractionAllowlistDesktopName[];
extern const char kAutofillEnableAmountExtractionAllowlistDesktopDescription[];
extern const char kAutofillEnableAmountExtractionDesktopName[];
@@ -384,7 +384,7 @@ extern const char kAutofillEnableAmountExtractionDeskt
@@ -394,7 +394,7 @@ extern const char kAutofillEnableAmountExtractionDeskt
// BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -18,7 +18,7 @@
extern const char kAutofillEnableBuyNowPayLaterName[];
extern const char kAutofillEnableBuyNowPayLaterDescription[];
@@ -602,7 +602,7 @@ extern const char kContextMenuEmptySpaceName[];
@@ -620,7 +620,7 @@ extern const char kContextMenuEmptySpaceName[];
extern const char kContextMenuEmptySpaceDescription[];
#endif // BUILDFLAG(IS_ANDROID)
@ -27,7 +27,7 @@
extern const char kContextualCueingName[];
extern const char kContextualCueingDescription[];
extern const char kGlicZeroStateSuggestionsName[];
@@ -786,7 +786,7 @@ extern const char kDevicePostureName[];
@@ -813,7 +813,7 @@ extern const char kDevicePostureName[];
extern const char kDevicePostureDescription[];
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -36,7 +36,7 @@
extern const char kDocumentPictureInPictureAnimateResizeName[];
extern const char kDocumentPictureInPictureAnimateResizeDescription[];
@@ -948,7 +948,7 @@ extern const char kEnableIsolatedWebAppAllowlistDescri
@@ -975,7 +975,7 @@ extern const char kEnableIsolatedWebAppAllowlistDescri
extern const char kEnableIsolatedWebAppDevModeName[];
extern const char kEnableIsolatedWebAppDevModeDescription[];
@ -45,7 +45,7 @@
extern const char kEnableIwaKeyDistributionComponentName[];
extern const char kEnableIwaKeyDistributionComponentDescription[];
#endif // BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
@@ -1964,7 +1964,7 @@ extern const char kRetainOmniboxOnFocusName[];
@@ -2023,7 +2023,7 @@ extern const char kRetainOmniboxOnFocusName[];
extern const char kRetainOmniboxOnFocusDescription[];
#endif // BUILDFLAG(IS_ANDROID)
@ -54,7 +54,7 @@
extern const char kRootScrollbarFollowsTheme[];
extern const char kRootScrollbarFollowsThemeDescription[];
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)
@@ -2096,7 +2096,7 @@ extern const char kDefaultSiteInstanceGroupsName[];
@@ -2161,7 +2161,7 @@ extern const char kDefaultSiteInstanceGroupsName[];
extern const char kDefaultSiteInstanceGroupsDescription[];
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -63,7 +63,7 @@
extern const char kPwaNavigationCapturingName[];
extern const char kPwaNavigationCapturingDescription[];
#endif
@@ -2242,7 +2242,7 @@ extern const char kTouchTextEditingRedesignDescription
@@ -2308,7 +2308,7 @@ extern const char kTouchTextEditingRedesignDescription
extern const char kTranslateForceTriggerOnEnglishName[];
extern const char kTranslateForceTriggerOnEnglishDescription[];
@ -72,7 +72,7 @@
extern const char kEnableHistorySyncOptinName[];
extern const char kEnableHistorySyncOptinDescription[];
@@ -3197,7 +3197,7 @@ extern const char kTranslateOpenSettingsName[];
@@ -3313,7 +3313,7 @@ extern const char kTranslateOpenSettingsName[];
extern const char kTranslateOpenSettingsDescription[];
#endif
@ -81,7 +81,7 @@
extern const char kWasmTtsComponentUpdaterEnabledName[];
extern const char kWasmTtsComponentUpdaterEnabledDescription[];
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC)
@@ -4385,7 +4385,7 @@ extern const char kTetheringExperimentalFunctionalityD
@@ -4519,7 +4519,7 @@ extern const char kTetheringExperimentalFunctionalityD
#endif // #if BUILDFLAG(IS_CHROMEOS)
@ -90,7 +90,7 @@
extern const char kGetAllScreensMediaName[];
extern const char kGetAllScreensMediaDescription[];
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
@@ -4520,7 +4520,7 @@ extern const char kEnableArmHwdrmDescription[];
@@ -4654,7 +4654,7 @@ extern const char kEnableArmHwdrmDescription[];
// Linux ---------------------------------------------------------------------
@ -99,7 +99,7 @@
extern const char kOzonePlatformHintChoiceDefault[];
extern const char kOzonePlatformHintChoiceAuto[];
extern const char kOzonePlatformHintChoiceX11[];
@@ -4551,6 +4551,9 @@ extern const char kWaylandTextInputV3Description[];
@@ -4685,6 +4685,9 @@ extern const char kWaylandTextInputV3Description[];
extern const char kWaylandUiScalingName[];
extern const char kWaylandUiScalingDescription[];
@ -109,7 +109,7 @@
#endif // BUILDFLAG(IS_LINUX)
// Random platform combinations -----------------------------------------------
@@ -4570,7 +4573,7 @@ extern const char kWebBluetoothConfirmPairingSupportNa
@@ -4704,7 +4707,7 @@ extern const char kWebBluetoothConfirmPairingSupportNa
extern const char kWebBluetoothConfirmPairingSupportDescription[];
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)
@ -118,7 +118,7 @@
#if BUILDFLAG(ENABLE_PRINTING)
extern const char kCupsIppPrintingBackendName[];
extern const char kCupsIppPrintingBackendDescription[];
@@ -4583,7 +4586,7 @@ extern const char kScreenlockReauthCardDescription[];
@@ -4717,7 +4720,7 @@ extern const char kScreenlockReauthCardDescription[];
#endif // BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -127,7 +127,7 @@
extern const char kFollowingFeedSidepanelName[];
extern const char kFollowingFeedSidepanelDescription[];
@@ -4600,7 +4603,7 @@ extern const char kTaskManagerDesktopRefreshName[];
@@ -4734,7 +4737,7 @@ extern const char kTaskManagerDesktopRefreshName[];
extern const char kTaskManagerDesktopRefreshDescription[];
#endif // BUILDFLAG(IS_ANDROID)
@ -136,7 +136,7 @@
extern const char kEnableNetworkServiceSandboxName[];
extern const char kEnableNetworkServiceSandboxDescription[];
@@ -4695,7 +4698,7 @@ extern const char kElementCaptureName[];
@@ -4826,7 +4829,7 @@ extern const char kElementCaptureName[];
extern const char kElementCaptureDescription[];
#endif // !BUILDFLAG(IS_ANDROID)
@ -145,7 +145,7 @@
extern const char kUIDebugToolsName[];
extern const char kUIDebugToolsDescription[];
#endif
@@ -4734,7 +4737,7 @@ extern const char kComposeUpfrontInputModesName[];
@@ -4865,7 +4868,7 @@ extern const char kComposeUpfrontInputModesName[];
extern const char kComposeUpfrontInputModesDescription[];
#endif // BUILDFLAG(ENABLE_COMPOSE)
@ -154,7 +154,7 @@
extern const char kThirdPartyProfileManagementName[];
extern const char kThirdPartyProfileManagementDescription[];
@@ -4814,7 +4817,7 @@ extern const char kEnablePolicyPromotionBannerDescript
@@ -4948,7 +4951,7 @@ extern const char kEnablePolicyPromotionBannerDescript
extern const char kSupervisedUserBlockInterstitialV3Name[];
extern const char kSupervisedUserBlockInterstitialV3Description[];

View file

@ -1,6 +1,6 @@
--- chrome/browser/global_features.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/global_features.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/global_features.cc
@@ -22,7 +22,7 @@
@@ -23,7 +23,7 @@
#include "chrome/browser/glic/host/glic_synthetic_trial_manager.h" // nogncheck
#endif
@ -9,7 +9,7 @@
// This causes a gn error on Android builds, because gn does not understand
// buildflags, so we include it only on platforms where it is used.
#include "chrome/browser/ui/webui/whats_new/whats_new_registrar.h"
@@ -61,7 +61,7 @@ void GlobalFeatures::ReplaceGlobalFeaturesForTesting(
@@ -62,7 +62,7 @@ void GlobalFeatures::ReplaceGlobalFeaturesForTesting(
void GlobalFeatures::Init() {
system_permissions_platform_handle_ = CreateSystemPermissionsPlatformHandle();
@ -18,7 +18,7 @@
whats_new_registry_ = CreateWhatsNewRegistry();
#endif
@@ -93,7 +93,7 @@ GlobalFeatures::CreateSystemPermissionsPlatformHandle(
@@ -96,7 +96,7 @@ GlobalFeatures::CreateSystemPermissionsPlatformHandle(
return system_permission_settings::PlatformHandle::Create();
}

View file

@ -1,4 +1,4 @@
--- chrome/browser/global_features.h.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/global_features.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/global_features.h
@@ -14,7 +14,7 @@
namespace system_permission_settings {
@ -9,7 +9,7 @@
namespace whats_new {
class WhatsNewRegistry;
} // namespace whats_new
@@ -56,7 +56,7 @@ class GlobalFeatures {
@@ -58,7 +58,7 @@ class GlobalFeatures {
system_permissions_platform_handle() {
return system_permissions_platform_handle_.get();
}
@ -18,7 +18,7 @@
whats_new::WhatsNewRegistry* whats_new_registry() {
return whats_new_registry_.get();
}
@@ -85,7 +85,7 @@ class GlobalFeatures {
@@ -91,7 +91,7 @@ class GlobalFeatures {
virtual std::unique_ptr<system_permission_settings::PlatformHandle>
CreateSystemPermissionsPlatformHandle();
@ -27,7 +27,7 @@
virtual std::unique_ptr<whats_new::WhatsNewRegistry> CreateWhatsNewRegistry();
#endif
@@ -95,7 +95,7 @@ class GlobalFeatures {
@@ -101,7 +101,7 @@ class GlobalFeatures {
std::unique_ptr<system_permission_settings::PlatformHandle>
system_permissions_platform_handle_;

View file

@ -1,4 +1,4 @@
--- chrome/browser/metrics/chrome_browser_main_extra_parts_metrics.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/metrics/chrome_browser_main_extra_parts_metrics.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/metrics/chrome_browser_main_extra_parts_metrics.cc
@@ -85,7 +85,7 @@
#include "chrome/browser/flags/android/chrome_session_state.h"
@ -27,7 +27,7 @@
#include "components/power_metrics/system_power_monitor.h"
#endif
@@ -873,7 +873,7 @@ void RecordStartupMetrics() {
@@ -898,7 +898,7 @@ void RecordStartupMetrics() {
// Record whether Chrome is the default browser or not.
// Disabled on Linux due to hanging browser tests, see crbug.com/1216328.
@ -36,7 +36,7 @@
shell_integration::DefaultWebClientState default_state =
shell_integration::GetDefaultBrowser();
base::UmaHistogramEnumeration("DefaultBrowser.State", default_state,
@@ -1181,11 +1181,11 @@ void ChromeBrowserMainExtraPartsMetrics::PostBrowserSt
@@ -1211,11 +1211,11 @@ void ChromeBrowserMainExtraPartsMetrics::PostBrowserSt
std::make_unique<web_app::SamplingMetricsProvider>();
#endif // !BUILDFLAG(IS_ANDROID)

View file

@ -1,6 +1,6 @@
--- chrome/browser/metrics/chrome_metrics_service_client.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/metrics/chrome_metrics_service_client.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/metrics/chrome_metrics_service_client.cc
@@ -197,11 +197,11 @@
@@ -201,11 +201,11 @@
#include "chrome/browser/metrics/google_update_metrics_provider_mac.h"
#endif
@ -14,7 +14,7 @@
#include "chrome/browser/metrics/chrome_metrics_service_crash_reporter.h"
#endif
@@ -233,7 +233,7 @@ const int kMaxHistogramGatheringWaitDuration = 60000;
@@ -237,7 +237,7 @@ const int kMaxHistogramGatheringWaitDuration = 60000;
// Needs to be kept in sync with the writer in
// third_party/crashpad/crashpad/handler/handler_main.cc.
const char kCrashpadHistogramAllocatorName[] = "CrashpadMetrics";
@ -23,7 +23,7 @@
base::LazyInstance<ChromeMetricsServiceCrashReporter>::Leaky g_crash_reporter =
LAZY_INSTANCE_INITIALIZER;
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_LINUX)
@@ -537,7 +537,7 @@ void ChromeMetricsServiceClient::RegisterPrefs(PrefReg
@@ -541,7 +541,7 @@ void ChromeMetricsServiceClient::RegisterPrefs(PrefReg
#endif // BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || \
@ -32,7 +32,7 @@
metrics::structured::StructuredMetricsService::RegisterPrefs(registry);
#if !BUILDFLAG(IS_CHROMEOS)
@@ -619,7 +619,7 @@ std::string ChromeMetricsServiceClient::GetVersionStri
@@ -623,7 +623,7 @@ std::string ChromeMetricsServiceClient::GetVersionStri
void ChromeMetricsServiceClient::OnEnvironmentUpdate(std::string* environment) {
// TODO(https://bugs.chromium.org/p/crashpad/issues/detail?id=135): call this
// on Mac when the Crashpad API supports it.
@ -41,7 +41,7 @@
// Register the environment with the crash reporter. Note that there is a
// window from startup to this point during which crash reports will not have
// an environment set.
@@ -721,7 +721,7 @@ void ChromeMetricsServiceClient::Initialize() {
@@ -725,7 +725,7 @@ void ChromeMetricsServiceClient::Initialize() {
std::make_unique<metrics::dwa::DwaService>(this, local_state);
}
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -50,7 +50,7 @@
metrics::structured::Recorder::GetInstance()->SetUiTaskRunner(
base::SequencedTaskRunner::GetCurrentDefault());
#endif
@@ -781,7 +781,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
@@ -785,7 +785,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
metrics_service_->RegisterMetricsProvider(
std::make_unique<metrics::CPUMetricsProvider>());
@ -59,7 +59,7 @@
metrics_service_->RegisterMetricsProvider(
std::make_unique<metrics::MotherboardMetricsProvider>());
#endif
@@ -870,7 +870,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
@@ -874,7 +874,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
std::make_unique<GoogleUpdateMetricsProviderMac>());
#endif
@ -68,7 +68,7 @@
metrics_service_->RegisterMetricsProvider(
std::make_unique<DesktopPlatformFeaturesMetricsProvider>());
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
@@ -974,7 +974,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
@@ -978,7 +978,7 @@ void ChromeMetricsServiceClient::RegisterMetricsServic
std::make_unique<PowerMetricsProvider>());
#endif
@ -77,7 +77,7 @@
metrics_service_->RegisterMetricsProvider(
metrics::CreateDesktopSessionMetricsProvider());
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || (BUILDFLAG(IS_LINUX)
@@ -1160,7 +1160,7 @@ bool ChromeMetricsServiceClient::RegisterForProfileEve
@@ -1169,7 +1169,7 @@ bool ChromeMetricsServiceClient::RegisterForProfileEve
}
#endif
@ -86,7 +86,7 @@
// This creates the DesktopProfileSessionDurationsServices if it didn't exist
// already.
metrics::DesktopProfileSessionDurationsServiceFactory::GetForBrowserContext(
@@ -1509,7 +1509,7 @@ void ChromeMetricsServiceClient::CreateStructuredMetri
@@ -1518,7 +1518,7 @@ void ChromeMetricsServiceClient::CreateStructuredMetri
recorder =
base::MakeRefCounted<metrics::structured::AshStructuredMetricsRecorder>(
cros_system_profile_provider_.get());

View file

@ -1,4 +1,4 @@
--- chrome/browser/net/profile_network_context_service.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/net/profile_network_context_service.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/net/profile_network_context_service.cc
@@ -135,7 +135,7 @@
#include "extensions/common/constants.h"
@ -18,7 +18,7 @@
std::unique_ptr<net::ClientCertStore> GetWrappedCertStore(
Profile* profile,
std::unique_ptr<net::ClientCertStore> platform_store) {
@@ -1228,7 +1228,7 @@ ProfileNetworkContextService::CreateClientCertStore()
@@ -1224,7 +1224,7 @@ ProfileNetworkContextService::CreateClientCertStore()
std::make_unique<net::ClientCertStoreNSS>(
base::BindRepeating(&CreateCryptoModuleBlockingPasswordDelegate,
kCryptoModulePasswordClientAuth));

View file

@ -1,4 +1,4 @@
--- chrome/browser/net/system_network_context_manager.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/net/system_network_context_manager.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/net/system_network_context_manager.cc
@@ -135,7 +135,7 @@ SystemNetworkContextManager* g_system_network_context_
// received a failed launch for a sandboxed network service.
@ -118,7 +118,7 @@
registry->RegisterBooleanPref(prefs::kReceivedHttpAuthNegotiateHeader, false);
#endif // BUILDFLAG(IS_LINUX)
@@ -741,7 +741,7 @@ void SystemNetworkContextManager::OnNetworkServiceCrea
@@ -739,7 +739,7 @@ void SystemNetworkContextManager::OnNetworkServiceCrea
OnNewHttpAuthDynamicParams(http_auth_dynamic_params);
network_service->ConfigureHttpAuthPrefs(std::move(http_auth_dynamic_params));
@ -127,7 +127,7 @@
gssapi_library_loader_observer_.Install(network_service);
#endif // BUILDFLAG(IS_LINUX)
@@ -960,7 +960,7 @@ bool SystemNetworkContextManager::IsNetworkSandboxEnab
@@ -957,7 +957,7 @@ bool SystemNetworkContextManager::IsNetworkSandboxEnab
break;
}

View file

@ -1,6 +1,6 @@
--- chrome/browser/password_manager/chrome_password_manager_client.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/password_manager/chrome_password_manager_client.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/password_manager/chrome_password_manager_client.cc
@@ -638,7 +638,7 @@ void ChromePasswordManagerClient::
@@ -664,7 +664,7 @@ void ChromePasswordManagerClient::
bool ChromePasswordManagerClient::IsReauthBeforeFillingRequired(
device_reauth::DeviceAuthenticator* authenticator) {
#if BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || \
@ -9,7 +9,7 @@
if (!GetLocalStatePrefs() || !GetPrefs() || !authenticator) {
return false;
}
@@ -916,7 +916,7 @@ void ChromePasswordManagerClient::NotifyUserCredential
@@ -942,7 +942,7 @@ void ChromePasswordManagerClient::NotifyUserCredential
}
void ChromePasswordManagerClient::NotifyKeychainError() {

View file

@ -1,6 +1,6 @@
--- chrome/browser/password_manager/password_reuse_manager_factory.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/password_manager/password_reuse_manager_factory.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/password_manager/password_reuse_manager_factory.cc
@@ -137,7 +137,7 @@ PasswordReuseManagerFactory::BuildServiceInstanceForBr
@@ -128,7 +128,7 @@ PasswordReuseManagerFactory::BuildServiceInstanceForBr
// Prepare password hash data for reuse detection.
reuse_manager->PreparePasswordHashData(GetSignInStateForMetrics(profile));

View file

@ -1,6 +1,6 @@
--- chrome/browser/policy/configuration_policy_handler_list_factory.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/policy/configuration_policy_handler_list_factory.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/policy/configuration_policy_handler_list_factory.cc
@@ -255,19 +255,19 @@
@@ -256,19 +256,19 @@
#include "components/spellcheck/browser/pref_names.h"
#endif // BUILDFLAG(ENABLE_SPELLCHECK)
@ -23,7 +23,7 @@
#include "chrome/browser/privacy_sandbox/privacy_sandbox_policy_handler.h"
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) ||
// BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID)
@@ -281,13 +281,13 @@
@@ -282,13 +282,13 @@
#endif // BUILDFLAG(ENTERPRISE_CLIENT_CERTIFICATES)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -39,25 +39,25 @@
#include "components/search_engines/enterprise/search_aggregator_policy_handler.h"
#include "components/search_engines/enterprise/site_search_policy_handler.h"
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) ||
@@ -592,7 +592,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
{ key::kDefaultDirectSocketsSetting,
prefs::kManagedDefaultDirectSocketsSetting,
@@ -597,7 +597,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
prefs::kManagedDefaultSmartCardConnectSetting,
base::Value::Type::INTEGER },
#endif
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
{ key::kDeletingUndecryptablePasswordsEnabled,
password_manager::prefs::kDeletingUndecryptablePasswordsEnabled,
base::Value::Type::BOOLEAN },
@@ -957,7 +957,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -964,7 +964,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
prefs::kManagedDefaultGeolocationSetting,
base::Value::Type::INTEGER },
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) \
- || BUILDFLAG(IS_MAC)
+ || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_BSD)
{ key::kRequireOnlineRevocationChecksForLocalAnchors,
prefs::kCertRevocationCheckingRequiredLocalAnchors,
base::Value::Type::BOOLEAN },
@@ -966,7 +966,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
{ key::kMandatoryExtensionsForIncognitoNavigation,
prefs::kMandatoryExtensionsForIncognitoNavigation,
base::Value::Type::LIST },
@@ -976,7 +976,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::BOOLEAN },
#endif // #if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
// || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
@ -66,7 +66,7 @@
{ key::kFullscreenAllowed,
prefs::kFullscreenAllowed,
base::Value::Type::BOOLEAN },
@@ -1842,7 +1842,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -1852,7 +1852,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::INTEGER},
#endif // BUILDFLAG(IS_CHROMEOS)
@ -75,7 +75,7 @@
{ key::kGSSAPILibraryName,
prefs::kGSSAPILibraryName,
base::Value::Type::STRING },
@@ -1901,7 +1901,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -1911,7 +1911,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_WIN)
@ -84,7 +84,7 @@
{ key::kNetworkServiceSandboxEnabled,
prefs::kNetworkServiceSandboxEnabled,
base::Value::Type::BOOLEAN },
@@ -1921,12 +1921,12 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -1931,12 +1931,12 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
prefs::kTotalMemoryLimitMb,
base::Value::Type::INTEGER },
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
@ -99,7 +99,7 @@
{ key::kUnmanagedDeviceSignalsConsentFlowEnabled,
device_signals::prefs::kUnmanagedDeviceSignalsConsentFlowEnabled,
base::Value::Type::BOOLEAN },
@@ -1937,7 +1937,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -1950,7 +1950,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
prefs::kLiveTranslateEnabled,
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
@ -108,7 +108,7 @@
{ key::kDefaultBrowserSettingEnabled,
prefs::kDefaultBrowserSettingEnabled,
base::Value::Type::BOOLEAN },
@@ -1949,7 +1949,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -1962,7 +1962,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) \
@ -117,7 +117,7 @@
{ key::kAutoplayAllowed,
prefs::kAutoplayAllowed,
base::Value::Type::BOOLEAN },
@@ -2050,7 +2050,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2063,7 +2063,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::BOOLEAN },
#endif // !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS)
@ -126,7 +126,7 @@
{ key::kAlternativeBrowserPath,
browser_switcher::prefs::kAlternativeBrowserPath,
base::Value::Type::STRING },
@@ -2155,7 +2155,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2164,7 +2164,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_CHROMEOS)
@ -135,7 +135,7 @@
{ key::kAuthNegotiateDelegateByKdcPolicy,
prefs::kAuthNegotiateDelegateByKdcPolicy,
base::Value::Type::BOOLEAN },
@@ -2226,7 +2226,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2235,7 +2235,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
ash::prefs::kUrlParameterToAutofillSAMLUsername,
base::Value::Type::STRING },
#endif // BUILDFLAG(IS_CHROMEOS)
@ -144,7 +144,7 @@
{ key::kTabDiscardingExceptions,
performance_manager::user_tuning::prefs::kManagedTabDiscardingExceptions,
base::Value::Type::LIST },
@@ -2255,7 +2255,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2264,7 +2264,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
prefs::kUiAutomationProviderEnabled,
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_WIN)
@ -153,7 +153,7 @@
{ key::kOutOfProcessSystemDnsResolutionEnabled,
prefs::kOutOfProcessSystemDnsResolutionEnabled,
base::Value::Type::BOOLEAN },
@@ -2298,7 +2298,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2304,7 +2304,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
base::Value::Type::INTEGER },
#endif
#if BUILDFLAG(ENABLE_EXTENSIONS)
@ -162,7 +162,7 @@
{ key::kExtensionInstallTypeBlocklist,
extensions::pref_names::kExtensionInstallTypeBlocklist,
base::Value::Type::LIST},
@@ -2324,7 +2324,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
@@ -2327,7 +2327,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
{ key::kTabCompareSettings,
optimization_guide::prefs::kProductSpecificationsEnterprisePolicyAllowed,
base::Value::Type::INTEGER},
@ -171,7 +171,16 @@
{ key::kChromeForTestingAllowed,
prefs::kChromeForTestingAllowed,
base::Value::Type::BOOLEAN },
@@ -2513,7 +2513,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -2397,7 +2397,7 @@ const PolicyToPreferenceMapEntry kSimplePolicyMap[] =
policy_prefs::kBuiltInAIAPIsEnabled,
base::Value::Type::BOOLEAN },
#endif // BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_FUCHSIA)
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
{ key::kNTPFooterThemeAttributionEnabled,
prefs::kNTPFooterThemeAttributionEnabled,
base::Value::Type::BOOLEAN },
@@ -2532,7 +2532,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
// Policies for all platforms - End
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -180,7 +189,7 @@
handlers->AddHandler(std::make_unique<IntRangePolicyHandler>(
key::kMemorySaverModeSavings,
performance_manager::user_tuning::prefs::kMemorySaverModeAggressiveness,
@@ -2734,7 +2734,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -2752,7 +2752,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
#endif // !BUILDFLAG(IS_ANDROID)
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -189,7 +198,7 @@
handlers->AddHandler(
std::make_unique<enterprise_idle::IdleTimeoutPolicyHandler>());
handlers->AddHandler(
@@ -2793,7 +2793,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -2811,7 +2811,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
key::kBrowsingDataLifetime, browsing_data::prefs::kBrowsingDataLifetime,
chrome_schema));
@ -198,7 +207,7 @@
handlers->AddHandler(std::make_unique<GuestModePolicyHandler>());
handlers->AddHandler(std::make_unique<LocalSyncPolicyHandler>());
handlers->AddHandler(std::make_unique<ThemeColorPolicyHandler>());
@@ -2890,7 +2890,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -2911,7 +2911,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
std::vector<std::unique_ptr<ConfigurationPolicyHandler>>
signin_legacy_policies;
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -207,7 +216,7 @@
signin_legacy_policies.push_back(std::make_unique<SimplePolicyHandler>(
key::kForceBrowserSignin, prefs::kForceBrowserSignin,
base::Value::Type::BOOLEAN));
@@ -3262,7 +3262,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -3283,7 +3283,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
#endif
#if BUILDFLAG(ENABLE_SPELLCHECK)
@ -216,7 +225,7 @@
handlers->AddHandler(std::make_unique<SpellcheckLanguagePolicyHandler>());
handlers->AddHandler(
std::make_unique<SpellcheckLanguageBlocklistPolicyHandler>(
@@ -3270,7 +3270,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -3291,7 +3291,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN)
#endif // BUILDFLAG(ENABLE_SPELLCHECK)
@ -225,7 +234,7 @@
handlers->AddHandler(std::make_unique<SimplePolicyHandler>(
key::kAllowSystemNotifications, prefs::kAllowSystemNotifications,
base::Value::Type::BOOLEAN));
@@ -3288,7 +3288,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -3309,7 +3309,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
first_party_sets::FirstPartySetsOverridesPolicyHandler>(
key::kRelatedWebsiteSetsOverrides, chrome_schema)));
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -234,7 +243,7 @@
handlers->AddHandler(std::make_unique<PrivacySandboxPolicyHandler>());
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) ||
// BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID)
@@ -3311,7 +3311,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -3332,7 +3332,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
base::Value::Type::BOOLEAN)));
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -243,7 +252,7 @@
handlers->AddHandler(std::make_unique<BatterySaverPolicyHandler>());
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) ||
// BUILDFLAG(IS_CHROMEOS)
@@ -3329,7 +3329,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
@@ -3350,7 +3350,7 @@ std::unique_ptr<ConfigurationPolicyHandlerList> BuildH
std::vector<GenAiDefaultSettingsPolicyHandler::GenAiPolicyDetails>
gen_ai_default_policies;
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \

View file

@ -1,15 +1,15 @@
--- chrome/browser/prefs/browser_prefs.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/prefs/browser_prefs.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/prefs/browser_prefs.cc
@@ -316,7 +316,7 @@
@@ -323,7 +323,7 @@
#include "chrome/browser/devtools/devtools_window.h"
#endif // !BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_DESKTOP_ANDROID)
#endif // BUILDFLAG(ENABLE_DEVTOOLS_FRONTEND)
-#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
+#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)
#include "chrome/browser/ui/webui/whats_new/whats_new_ui.h"
#endif
@@ -487,11 +487,11 @@
@@ -494,11 +494,11 @@
#endif
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
@ -23,7 +23,7 @@
#include "chrome/browser/browser_switcher/browser_switcher_prefs.h"
#include "chrome/browser/enterprise/signin/enterprise_signin_prefs.h"
#endif
@@ -519,7 +519,7 @@
@@ -526,7 +526,7 @@
#include "chrome/browser/sessions/session_service_log.h"
#endif
@ -32,7 +32,7 @@
#include "ui/color/system_theme.h"
#endif
@@ -1664,7 +1664,7 @@ void RegisterLocalState(PrefRegistrySimple* registry)
@@ -1679,7 +1679,7 @@ void RegisterLocalState(PrefRegistrySimple* registry)
on_device_translation::RegisterLocalStatePrefs(registry);
#endif // BUILDFLAG(ENABLE_ON_DEVICE_TRANSLATION)
@ -41,7 +41,7 @@
WhatsNewUI::RegisterLocalStatePrefs(registry);
#endif
@@ -1821,7 +1821,7 @@ void RegisterLocalState(PrefRegistrySimple* registry)
@@ -1836,7 +1836,7 @@ void RegisterLocalState(PrefRegistrySimple* registry)
#endif // BUILDFLAG(ENABLE_PDF)
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
@ -50,7 +50,7 @@
registry->RegisterBooleanPref(prefs::kChromeForTestingAllowed, true);
#endif
@@ -2177,12 +2177,12 @@ void RegisterProfilePrefs(user_prefs::PrefRegistrySync
@@ -2200,12 +2200,12 @@ void RegisterProfilePrefs(user_prefs::PrefRegistrySync
#endif
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \

View file

@ -1,6 +1,6 @@
--- chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
@@ -358,7 +358,7 @@
@@ -362,7 +362,7 @@
#endif
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -9,7 +9,7 @@
#include "chrome/browser/enterprise/idle/idle_service_factory.h"
#endif
@@ -400,7 +400,7 @@
@@ -404,7 +404,7 @@
#endif
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -18,7 +18,7 @@
#include "chrome/browser/enterprise/connectors/device_trust/device_trust_connector_service_factory.h"
#include "chrome/browser/enterprise/connectors/device_trust/device_trust_service_factory.h"
#include "chrome/browser/enterprise/signals/user_permission_service_factory.h"
@@ -408,7 +408,7 @@
@@ -412,7 +412,7 @@
#include "chrome/browser/ui/tabs/saved_tab_groups/saved_tab_group_utils.h"
#endif
@ -27,7 +27,7 @@
#include "chrome/browser/policy/messaging_layer/util/manual_test_heartbeat_event_factory.h"
#endif
@@ -416,7 +416,7 @@
@@ -420,7 +420,7 @@
#include "chrome/browser/history_embeddings/history_embeddings_service_factory.h"
#endif
@ -36,7 +36,7 @@
#include "chrome/browser/browser_switcher/browser_switcher_service_factory.h"
#include "chrome/browser/enterprise/client_certificates/certificate_provisioning_service_factory.h"
#include "chrome/browser/enterprise/client_certificates/certificate_store_factory.h"
@@ -730,7 +730,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -738,7 +738,7 @@ void ChromeBrowserMainExtraPartsProfiles::
DiceBoundSessionCookieServiceFactory::GetInstance();
#endif
#endif
@ -45,7 +45,14 @@
browser_switcher::BrowserSwitcherServiceFactory::GetInstance();
#endif
browser_sync::UserEventServiceFactory::GetInstance();
@@ -787,7 +787,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -793,13 +793,13 @@ void ChromeBrowserMainExtraPartsProfiles::
collaboration::CollaborationServiceFactory::GetInstance();
collaboration::messaging::MessagingBackendServiceFactory::GetInstance();
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
- BUILDFLAG(IS_WIN)
+ BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
tab_groups::CollaborationMessagingObserverFactory::GetInstance();
#endif
commerce::ShoppingServiceFactory::GetInstance();
ConsentAuditorFactory::GetInstance();
ContentIndexProviderFactory::GetInstance();
@ -54,7 +61,7 @@
contextual_cueing::ContextualCueingServiceFactory::GetInstance();
#endif
CookieControlsServiceFactory::GetInstance();
@@ -843,31 +843,31 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -860,31 +860,31 @@ void ChromeBrowserMainExtraPartsProfiles::
enterprise_connectors::ConnectorsServiceFactory::GetInstance();
enterprise_connectors::ReportingEventRouterFactory::GetInstance();
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -92,7 +99,7 @@
enterprise_signin::EnterpriseSigninServiceFactory::GetInstance();
#endif
#if BUILDFLAG(ENABLE_SESSION_SERVICE)
@@ -995,7 +995,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -1015,7 +1015,7 @@ void ChromeBrowserMainExtraPartsProfiles::
#if BUILDFLAG(IS_ANDROID)
MerchantViewerDataManagerFactory::GetInstance();
#endif
@ -101,7 +108,7 @@
metrics::DesktopProfileSessionDurationsServiceFactory::GetInstance();
#endif
#if !BUILDFLAG(IS_ANDROID)
@@ -1111,7 +1111,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -1134,7 +1134,7 @@ void ChromeBrowserMainExtraPartsProfiles::
#if BUILDFLAG(IS_CHROMEOS)
policy::PolicyCertServiceFactory::GetInstance();
#endif
@ -110,7 +117,7 @@
policy::ProfileTokenPolicyWebSigninServiceFactory::GetInstance();
policy::UserPolicyOidcSigninServiceFactory::GetInstance();
#endif
@@ -1157,7 +1157,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -1180,7 +1180,7 @@ void ChromeBrowserMainExtraPartsProfiles::
#if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS)
ProfileStatisticsFactory::GetInstance();
#endif
@ -119,7 +126,7 @@
ProfileTokenWebSigninInterceptorFactory::GetInstance();
OidcAuthenticationSigninInterceptorFactory::GetInstance();
#endif
@@ -1177,7 +1177,7 @@ void ChromeBrowserMainExtraPartsProfiles::
@@ -1200,7 +1200,7 @@ void ChromeBrowserMainExtraPartsProfiles::
ReduceAcceptLanguageFactory::GetInstance();
RendererUpdaterFactory::GetInstance();
regional_capabilities::RegionalCapabilitiesServiceFactory::GetInstance();
@ -128,12 +135,3 @@
reporting::ManualTestHeartbeatEventFactory::GetInstance();
#endif
#if !BUILDFLAG(IS_ANDROID)
@@ -1368,7 +1368,7 @@ void ChromeBrowserMainExtraPartsProfiles::
WebDataServiceFactory::GetInstance();
webrtc_event_logging::WebRtcEventLogManagerKeyedServiceFactory::GetInstance();
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
- BUILDFLAG(IS_WIN)
+ BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
if (tab_groups::SavedTabGroupUtils::SupportsSharedTabGroups()) {
tab_groups::CollaborationMessagingObserverFactory::GetInstance();
}

View file

@ -1,6 +1,6 @@
--- chrome/browser/safe_browsing/chrome_password_protection_service.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/safe_browsing/chrome_password_protection_service.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/safe_browsing/chrome_password_protection_service.cc
@@ -1262,7 +1262,7 @@ std::string ChromePasswordProtectionService::GetOrgani
@@ -1269,7 +1269,7 @@ std::string ChromePasswordProtectionService::GetOrgani
ReusedPasswordAccountType password_type) const {
if (base::FeatureList::IsEnabled(
safe_browsing::kEnterprisePasswordReuseUiRefresh)) {

View file

@ -1,6 +1,6 @@
--- chrome/browser/screen_ai/screen_ai_service_router.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/screen_ai/screen_ai_service_router.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/screen_ai/screen_ai_service_router.cc
@@ -403,7 +403,7 @@ void ScreenAIServiceRouter::LaunchIfNotRunning() {
@@ -405,7 +405,7 @@ void ScreenAIServiceRouter::LaunchIfNotRunning() {
base::FilePath binary_path = state_instance->get_component_binary_path();
#if BUILDFLAG(IS_WIN)
std::vector<base::FilePath> preload_libraries = {binary_path};
@ -9,7 +9,7 @@
std::vector<std::string> extra_switches = {
base::StringPrintf("--%s=%s", screen_ai::GetBinaryPathSwitch(),
binary_path.MaybeAsASCII().c_str())};
@@ -417,7 +417,7 @@ void ScreenAIServiceRouter::LaunchIfNotRunning() {
@@ -419,7 +419,7 @@ void ScreenAIServiceRouter::LaunchIfNotRunning() {
.WithPreloadedLibraries(
preload_libraries,
content::ServiceProcessHostPreloadLibraries::GetPassKey())

View file

@ -1,4 +1,4 @@
--- chrome/browser/supervised_user/classify_url_navigation_throttle.cc.orig 2025-03-05 08:14:56 UTC
--- chrome/browser/supervised_user/classify_url_navigation_throttle.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/supervised_user/classify_url_navigation_throttle.cc
@@ -68,7 +68,7 @@ std::ostream& operator<<(std::ostream& stream,
}
@ -9,7 +9,7 @@
bool ShouldShowReAuthInterstitial(
content::NavigationHandle& navigation_handle) {
Profile* profile = Profile::FromBrowserContext(
@@ -230,7 +230,7 @@ void ClassifyUrlNavigationThrottle::OnInterstitialResu
@@ -229,7 +229,7 @@ void ClassifyUrlNavigationThrottle::OnInterstitialResu
}
case InterstitialResultCallbackActions::kCancelWithInterstitial: {
CHECK(navigation_handle());

View file

@ -1,4 +1,4 @@
--- chrome/browser/supervised_user/supervised_user_browser_utils.cc.orig 2025-02-19 07:43:18 UTC
--- chrome/browser/supervised_user/supervised_user_browser_utils.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/supervised_user/supervised_user_browser_utils.cc
@@ -40,7 +40,7 @@
#include "chrome/browser/ash/profiles/profile_helper.h"
@ -9,7 +9,7 @@
#include "chrome/browser/supervised_user/supervised_user_verification_controller_client.h"
#include "chrome/browser/supervised_user/supervised_user_verification_page_blocked_sites.h"
#include "chrome/browser/supervised_user/supervised_user_verification_page_youtube.h"
@@ -165,7 +165,7 @@ void AssertChildStatusOfTheUser(Profile* profile, bool
@@ -158,7 +158,7 @@ void AssertChildStatusOfTheUser(Profile* profile, bool
#endif
}

View file

@ -1,4 +1,4 @@
--- chrome/browser/supervised_user/supervised_user_extensions_delegate_impl.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/supervised_user/supervised_user_extensions_delegate_impl.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/supervised_user/supervised_user_extensions_delegate_impl.cc
@@ -197,7 +197,7 @@ void SupervisedUserExtensionsDelegateImpl::RequestExte
return;
@ -8,4 +8,4 @@
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
CHECK(contents.value());
content::WebContents* web_contents = contents.value().get();
if (supervised_user::
// Always invoke the parent permission dialog.

View file

@ -1,6 +1,6 @@
--- chrome/browser/supervised_user/supervised_user_extensions_manager.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/supervised_user/supervised_user_extensions_manager.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/supervised_user/supervised_user_extensions_manager.cc
@@ -357,7 +357,7 @@ void SupervisedUserExtensionsManager::
@@ -348,7 +348,7 @@ void SupervisedUserExtensionsManager::
ActivateManagementPolicyAndUpdateRegistration() {
SetActiveForSupervisedUsers();
UpdateManagementPolicyRegistration();
@ -9,7 +9,7 @@
MaybeMarkExtensionsLocallyParentApproved();
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
}
@@ -476,7 +476,7 @@ bool SupervisedUserExtensionsManager::ShouldBlockExten
@@ -448,7 +448,7 @@ bool SupervisedUserExtensionsManager::ShouldBlockExten
return false;
}

View file

@ -1,6 +1,6 @@
--- chrome/browser/sync/sync_service_factory.cc.orig 2025-04-04 08:52:13 UTC
--- chrome/browser/sync/sync_service_factory.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/sync/sync_service_factory.cc
@@ -108,7 +108,7 @@
@@ -110,7 +110,7 @@
#endif // BUILDFLAG(IS_CHROMEOS)
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -9,7 +9,7 @@
#include "chrome/browser/ui/tabs/saved_tab_groups/saved_tab_group_keyed_service.h"
#include "chrome/browser/ui/tabs/saved_tab_groups/saved_tab_group_service_factory.h"
#include "chrome/browser/ui/tabs/saved_tab_groups/saved_tab_group_utils.h"
@@ -135,7 +135,7 @@ namespace {
@@ -137,7 +137,7 @@ namespace {
tab_groups::TabGroupSyncService* GetTabGroupSyncService(Profile* profile) {
CHECK(profile);
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \
@ -18,7 +18,7 @@
tab_groups::TabGroupSyncService* service =
tab_groups::SavedTabGroupUtils::GetServiceForProfile(profile);
CHECK(service);
@@ -377,7 +377,7 @@ std::unique_ptr<KeyedService> BuildSyncService(
@@ -381,7 +381,7 @@ std::unique_ptr<KeyedService> BuildSyncService(
bool local_sync_backend_enabled = false;
// Only check the local sync backend pref on the supported platforms of
// Windows, Mac and Linux.
@ -27,7 +27,7 @@
syncer::SyncPrefs prefs(profile->GetPrefs());
local_sync_backend_enabled = prefs.IsLocalSyncEnabled();
base::UmaHistogramBoolean("Sync.Local.Enabled2", local_sync_backend_enabled);
@@ -512,7 +512,7 @@ SyncServiceFactory::SyncServiceFactory()
@@ -520,7 +520,7 @@ SyncServiceFactory::SyncServiceFactory()
DependsOn(ProfilePasswordStoreFactory::GetInstance());
DependsOn(PowerBookmarkServiceFactory::GetInstance());
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || \

View file

@ -1,6 +1,6 @@
--- chrome/browser/ui/actions/chrome_action_id.h.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/ui/actions/chrome_action_id.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/actions/chrome_action_id.h
@@ -497,7 +497,7 @@
@@ -501,7 +501,7 @@
#if BUILDFLAG(IS_CHROMEOS)
#define CHROME_PLATFORM_SPECIFIC_ACTION_IDS \
E(kToggleMultitaskMenu, IDC_TOGGLE_MULTITASK_MENU)

View file

@ -1,6 +1,6 @@
--- chrome/browser/ui/autofill/payments/desktop_payments_window_manager.cc.orig 2025-03-05 08:14:56 UTC
--- chrome/browser/ui/autofill/payments/desktop_payments_window_manager.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/autofill/payments/desktop_payments_window_manager.cc
@@ -57,7 +57,7 @@ gfx::Rect GetPopupSizeForBnpl() {
@@ -58,7 +58,7 @@ gfx::Rect GetPopupSizeForBnpl() {
DesktopPaymentsWindowManager::DesktopPaymentsWindowManager(
ContentAutofillClient* client)
: client_(CHECK_DEREF(client)) {
@ -9,7 +9,7 @@
scoped_observation_.Observe(BrowserList::GetInstance());
#endif // BUILDFLAG(IS_LINUX)
}
@@ -142,7 +142,7 @@ void DesktopPaymentsWindowManager::WebContentsDestroye
@@ -144,7 +144,7 @@ void DesktopPaymentsWindowManager::WebContentsDestroye
}
}

View file

@ -1,4 +1,4 @@
--- chrome/browser/ui/autofill/payments/desktop_payments_window_manager.h.orig 2025-03-05 08:14:56 UTC
--- chrome/browser/ui/autofill/payments/desktop_payments_window_manager.h.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/autofill/payments/desktop_payments_window_manager.h
@@ -14,7 +14,7 @@
#include "components/autofill/core/browser/payments/payments_window_manager.h"
@ -27,7 +27,7 @@
// BrowserListObserver:
void OnBrowserSetLastActive(Browser* browser) override;
#endif // BUILDFLAG(IS_LINUX)
@@ -161,7 +161,7 @@ class DesktopPaymentsWindowManager : public PaymentsWi
@@ -165,7 +165,7 @@ class DesktopPaymentsWindowManager : public PaymentsWi
// Used in tests to notify the test infrastructure that the pop-up has closed.
base::RepeatingClosure popup_closed_closure_for_testing_;

View file

@ -1,6 +1,6 @@
--- chrome/browser/ui/browser_command_controller.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/ui/browser_command_controller.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/browser_command_controller.cc
@@ -126,7 +126,7 @@
@@ -127,7 +127,7 @@
#include "components/user_manager/user_manager.h"
#endif
@ -9,7 +9,7 @@
#include "ui/base/ime/text_edit_commands.h"
#include "ui/base/ime/text_input_flags.h"
#include "ui/linux/linux_ui.h"
@@ -136,7 +136,7 @@
@@ -137,7 +137,7 @@
#include "ui/ozone/public/ozone_platform.h"
#endif
@ -18,7 +18,7 @@
#include "chrome/browser/ui/shortcuts/desktop_shortcuts_utils.h"
#endif // BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN)
@@ -332,7 +332,7 @@ bool BrowserCommandController::IsReservedCommandOrKey(
@@ -349,7 +349,7 @@ bool BrowserCommandController::IsReservedCommandOrKey(
#endif
}
@ -27,7 +27,7 @@
// If this key was registered by the user as a content editing hotkey, then
// it is not reserved.
auto* linux_ui = ui::LinuxUi::instance();
@@ -595,7 +595,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
@@ -612,7 +612,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
break;
#endif
@ -36,7 +36,7 @@
case IDC_MINIMIZE_WINDOW:
browser_->window()->Minimize();
break;
@@ -812,7 +812,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
@@ -829,7 +829,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
break;
case IDC_CREATE_SHORTCUT:
base::RecordAction(base::UserMetricsAction("CreateShortcut"));
@ -45,7 +45,7 @@
chrome::CreateDesktopShortcutForActiveWebContents(browser_);
#else
web_app::CreateWebAppFromCurrentWebContents(
@@ -979,7 +979,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
@@ -995,7 +995,7 @@ bool BrowserCommandController::ExecuteCommandWithDispo
#endif // BUILDFLAG(GOOGLE_CHROME_BRANDING)
case IDC_CHROME_WHATS_NEW:
#if BUILDFLAG(GOOGLE_CHROME_BRANDING) && \
@ -54,7 +54,7 @@
ShowChromeWhatsNew(browser_);
break;
#else
@@ -1324,7 +1324,7 @@ void BrowserCommandController::InitCommandState() {
@@ -1372,7 +1372,7 @@ void BrowserCommandController::InitCommandState() {
command_updater_.UpdateCommandEnabled(IDC_VISIT_DESKTOP_OF_LRU_USER_4, true);
command_updater_.UpdateCommandEnabled(IDC_VISIT_DESKTOP_OF_LRU_USER_5, true);
#endif
@ -63,7 +63,7 @@
command_updater_.UpdateCommandEnabled(IDC_MINIMIZE_WINDOW, true);
command_updater_.UpdateCommandEnabled(IDC_MAXIMIZE_WINDOW, true);
command_updater_.UpdateCommandEnabled(IDC_RESTORE_WINDOW, true);
@@ -1682,7 +1682,7 @@ void BrowserCommandController::UpdateCommandsForTabSta
@@ -1728,7 +1728,7 @@ void BrowserCommandController::UpdateCommandsForTabSta
bool can_create_web_app = web_app::CanCreateWebApp(browser_);
command_updater_.UpdateCommandEnabled(IDC_INSTALL_PWA, can_create_web_app);

View file

@ -1,6 +1,6 @@
--- chrome/browser/ui/browser_commands.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/ui/browser_commands.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/browser_commands.cc
@@ -1980,7 +1980,7 @@ void OpenUpdateChromeDialog(Browser* browser) {
@@ -2090,7 +2090,7 @@ void OpenUpdateChromeDialog(Browser* browser) {
} else if (UpgradeDetector::GetInstance()->is_outdated_install_no_au()) {
UpgradeDetector::GetInstance()->NotifyOutdatedInstallNoAutoUpdate();
} else {

View file

@ -1,9 +1,9 @@
--- chrome/browser/ui/browser_ui_prefs.cc.orig 2025-05-05 10:57:53 UTC
--- chrome/browser/ui/browser_ui_prefs.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/browser_ui_prefs.cc
@@ -72,7 +72,7 @@ void RegisterBrowserPrefs(PrefRegistrySimple* registry
registry->RegisterIntegerPref(prefs::kDefaultBrowserDeclinedCount, 0);
registry->RegisterTimePref(prefs::kDefaultBrowserFirstShownTime,
base::Time());
@@ -64,7 +64,7 @@ void RegisterBrowserPrefs(PrefRegistrySimple* registry
registry->RegisterTimePref(prefs::kPdfInfoBarLastShown, base::Time());
registry->RegisterIntegerPref(prefs::kPdfInfoBarTimesShown, 0);
#endif // BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC)
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD)
registry->RegisterStringPref(prefs::kEnterpriseCustomLabelForBrowser,

View file

@ -1,6 +1,6 @@
--- chrome/browser/ui/passwords/manage_passwords_ui_controller.cc.orig 2025-03-05 08:14:56 UTC
--- chrome/browser/ui/passwords/manage_passwords_ui_controller.cc.orig 2025-05-28 14:55:43 UTC
+++ chrome/browser/ui/passwords/manage_passwords_ui_controller.cc
@@ -102,7 +102,7 @@ namespace {
@@ -104,7 +104,7 @@ namespace {
using Logger = autofill::SavePasswordProgressLogger;
@ -9,7 +9,7 @@
// Should be kept in sync with constant declared in
// bubble_controllers/relaunch_chrome_bubble_controller.cc.
constexpr int kMaxNumberOfTimesKeychainErrorBubbleIsShown = 3;
@@ -549,7 +549,7 @@ void ManagePasswordsUIController::OnBiometricAuthBefor
@@ -562,7 +562,7 @@ void ManagePasswordsUIController::OnBiometricAuthBefor
}
void ManagePasswordsUIController::OnKeychainError() {

Some files were not shown because too many files have changed in this diff Show more