diff -up chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc.me chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc --- chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc.me 2023-02-08 20:34:02.700010846 +0100 +++ chromium-110.0.5481.77/sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.cc 2023-02-08 20:35:30.455580670 +0100 @@ -4,7 +4,9 @@ #include "sandbox/policy/linux/bpf_hardware_video_decoding_policy_linux.h" -#include +#ifndef KCMP_FILE +#define KCMP_FILE 0 +#endif #include "media/gpu/buildflags.h" #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" diff -up chromium-99.0.4844.51/mojo/core/channel_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/mojo/core/channel_linux.cc --- chromium-99.0.4844.51/mojo/core/channel_linux.cc.epel7-header-workarounds 2022-02-28 19:05:54.000000000 -0500 +++ chromium-99.0.4844.51/mojo/core/channel_linux.cc 2022-03-05 14:50:49.876812909 -0500 @@ -44,6 +44,25 @@ #include "base/android/build_info.h" #endif +#ifndef F_LINUX_SPECIFIC_BASE +#define F_LINUX_SPECIFIC_BASE 1024 +#endif +#ifndef F_SEAL_SEAL +#define F_SEAL_SEAL 0x0001 +#endif +#ifndef F_SEAL_SHRINK +#define F_SEAL_SHRINK 0x0002 +#endif +#ifndef F_SEAL_GROW +#define F_SEAL_GROW 0x0004 +#endif +#ifndef F_ADD_SEALS +#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9) +#endif +#ifndef F_GET_SEALS +#define F_GET_SEALS (F_LINUX_SPECIFIC_BASE + 10) +#endif + #ifndef EFD_ZERO_ON_WAKE #define EFD_ZERO_ON_WAKE O_NOFOLLOW #endif diff -up chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc --- chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc.epel7-header-workarounds 2022-03-05 14:50:49.877812915 -0500 +++ chromium-99.0.4844.51/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc 2022-03-05 15:15:02.536867009 -0500 @@ -53,6 +53,25 @@ #endif // BUILDFLAG(IS_ANDROID) +#ifndef F_LINUX_SPECIFIC_BASE +#define F_LINUX_SPECIFIC_BASE 1024 +#endif +#ifndef F_SEAL_SEAL +#define F_SEAL_SEAL 0x0001 +#endif +#ifndef F_SEAL_SHRINK +#define F_SEAL_SHRINK 0x0002 +#endif +#ifndef F_SEAL_GROW +#define F_SEAL_GROW 0x0004 +#endif +#ifndef F_ADD_SEALS +#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9) +#endif +#ifndef F_GET_SEALS +#define F_GET_SEALS (F_LINUX_SPECIFIC_BASE + 10) +#endif + #if defined(__arm__) && !defined(MAP_STACK) #define MAP_STACK 0x20000 // Daisy build environment has old headers. #endif diff -up chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc --- chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc.epel7-header-workarounds 2022-02-28 19:05:55.000000000 -0500 +++ chromium-99.0.4844.51/sandbox/policy/linux/bpf_cros_amd_gpu_policy_linux.cc 2022-03-05 14:50:49.877812915 -0500 @@ -6,7 +6,24 @@ #include #include -#include +#ifndef KCMP_FILE +#define KCMP_FILE 0 +#endif +#ifndef F_LINUX_SPECIFIC_BASE +#define F_LINUX_SPECIFIC_BASE 1024 +#endif +#ifndef F_SEAL_SEAL +#define F_SEAL_SEAL 0x0001 +#endif +#ifndef F_SEAL_SHRINK +#define F_SEAL_SHRINK 0x0002 +#endif +#ifndef F_SEAL_GROW +#define F_SEAL_GROW 0x0004 +#endif +#ifndef F_ADD_SEALS +#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9) +#endif #include // Some arch's (arm64 for instance) unistd.h don't pull in symbols used here diff -up chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc.epel7-header-workarounds chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc --- chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc.epel7-header-workarounds 2022-02-28 19:05:55.000000000 -0500 +++ chromium-99.0.4844.51/sandbox/policy/linux/bpf_gpu_policy_linux.cc 2022-03-05 14:50:49.877812915 -0500 @@ -22,6 +22,22 @@ #include "sandbox/policy/linux/sandbox_linux.h" #include "sandbox/policy/linux/sandbox_seccomp_bpf_linux.h" +#ifndef F_LINUX_SPECIFIC_BASE +#define F_LINUX_SPECIFIC_BASE 1024 +#endif +#ifndef F_SEAL_SEAL +#define F_SEAL_SEAL 0x0001 +#endif +#ifndef F_SEAL_SHRINK +#define F_SEAL_SHRINK 0x0002 +#endif +#ifndef F_SEAL_GROW +#define F_SEAL_GROW 0x0004 +#endif +#ifndef F_ADD_SEALS +#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9) +#endif + using sandbox::bpf_dsl::AllOf; using sandbox::bpf_dsl::Allow; using sandbox::bpf_dsl::Arg; diff -up chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc.epel7-header-workarounds chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc --- chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc.epel7-header-workarounds 2022-02-28 19:06:49.000000000 -0500 +++ chromium-99.0.4844.51/ui/events/ozone/evdev/event_converter_evdev_impl.cc 2022-03-05 14:50:49.877812915 -0500 @@ -23,6 +23,10 @@ #include "ui/events/ozone/evdev/numberpad_metrics.h" #endif +#ifndef SW_PEN_INSERTED +#define SW_PEN_INSERTED 0x0f /* set = pen inserted */ +#endif + namespace ui { namespace {