forked from mirrors/nixpkgs
d5c2b35b82
This enables legacy seccomp sandbox by default even on chromium 22, because the BPF sandbox is still work in progress, please see: http://crbug.com/139872 http://crbug.com/130662 Because the BPF seccomp sandbox is used in case the legacy seccomp mode initialization fails, we might need to patch this again, as soon as the BPF sandbox is fully implemented to fall back to legacy seccomp and use BPF by default. We now have two patches for "default to seccomp" - one for Chromium 21 and one for 22 or higher. |
||
---|---|---|
.. | ||
cups_allow_deprecated.patch | ||
default.nix | ||
enable_seccomp.patch | ||
enable_seccomp22.patch | ||
pulseaudio_array_bounds.patch | ||
sources.nix | ||
update.sh |