Browse Source

Update to Chromium 90.0.4430.72

Blaise 3 years ago
parent
commit
89ca20f4d9
56 changed files with 1214 additions and 720 deletions
  1. 1 1
      chromium_version.txt
  2. 0 1
      devutils/update_lists.py
  3. 118 143
      domain_substitution.list
  4. 1 0
      flags.gn
  5. 6 6
      patches/core/bromite/disable-fetching-field-trials.patch
  6. 41 40
      patches/core/inox-patchset/0001-fix-building-without-safebrowsing.patch
  7. 1 1
      patches/core/inox-patchset/0003-disable-autofill-download-manager.patch
  8. 10 10
      patches/core/inox-patchset/0005-disable-default-extensions.patch
  9. 1 1
      patches/core/inox-patchset/0015-disable-update-pings.patch
  10. 1 1
      patches/core/inox-patchset/0021-disable-rlz.patch
  11. 125 39
      patches/core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch
  12. 2 2
      patches/core/iridium-browser/safe_browsing-disable-incident-reporting.patch
  13. 4 4
      patches/core/iridium-browser/safe_browsing-disable-reporting-of-safebrowsing-over.patch
  14. 1 1
      patches/core/ungoogled-chromium/block-requests.patch
  15. 20 15
      patches/core/ungoogled-chromium/block-trk-and-subdomains.patch
  16. 0 10
      patches/core/ungoogled-chromium/disable-crash-reporter.patch
  17. 44 30
      patches/core/ungoogled-chromium/disable-fonts-googleapis-references.patch
  18. 15 7
      patches/core/ungoogled-chromium/disable-google-host-detection.patch
  19. 2 2
      patches/core/ungoogled-chromium/disable-mei-preload.patch
  20. 2 2
      patches/core/ungoogled-chromium/disable-signin.patch
  21. 2 2
      patches/core/ungoogled-chromium/disable-webstore-urls.patch
  22. 8 8
      patches/core/ungoogled-chromium/fix-building-without-enabling-reporting.patch
  23. 3 3
      patches/core/ungoogled-chromium/fix-building-without-one-click-signin.patch
  24. 294 88
      patches/core/ungoogled-chromium/fix-building-without-safebrowsing.patch
  25. 0 12
      patches/core/ungoogled-chromium/remove-enable-dse-memoryssa-cflag.patch
  26. 160 165
      patches/core/ungoogled-chromium/remove-unused-preferences-fields.patch
  27. 1 1
      patches/core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch
  28. 4 4
      patches/core/ungoogled-chromium/toggle-translation-via-switch.patch
  29. 1 1
      patches/core/ungoogled-chromium/use-local-devtools-files.patch
  30. 27 27
      patches/extra/bromite/fingerprinting-flags-client-rects-and-measuretext.patch
  31. 11 11
      patches/extra/bromite/flag-fingerprinting-canvas-image-data-noise.patch
  32. 5 5
      patches/extra/bromite/flag-max-connections-per-host.patch
  33. 1 1
      patches/extra/debian/disable/google-api-warning.patch
  34. 1 1
      patches/extra/debian/disable/welcome-page.patch
  35. 7 7
      patches/extra/inox-patchset/0006-modify-default-prefs.patch
  36. 1 1
      patches/extra/inox-patchset/0016-chromium-sandbox-pie.patch
  37. 3 3
      patches/extra/ungoogled-chromium/add-flag-for-omnibox-autocomplete-filtering.patch
  38. 5 5
      patches/extra/ungoogled-chromium/add-flag-for-pdf-plugin-name.patch
  39. 5 5
      patches/extra/ungoogled-chromium/add-flag-for-search-engine-collection.patch
  40. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-close-window-with-last-tab.patch
  41. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-configure-extension-downloading.patch
  42. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-convert-popups-to-tabs.patch
  43. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-hide-crashed-bubble.patch
  44. 5 5
      patches/extra/ungoogled-chromium/add-flag-to-scroll-tabs.patch
  45. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-show-avatar-button.patch
  46. 7 7
      patches/extra/ungoogled-chromium/add-ipv6-probing-option.patch
  47. 3 3
      patches/extra/ungoogled-chromium/add-suggestions-url-field.patch
  48. 1 1
      patches/extra/ungoogled-chromium/add-ungoogled-flag-headers.patch
  49. 5 2
      patches/extra/ungoogled-chromium/disable-download-quarantine.patch
  50. 2 2
      patches/extra/ungoogled-chromium/disable-webgl-renderer-info.patch
  51. 1 1
      patches/extra/ungoogled-chromium/enable-default-prefetch-privacy-changes.patch
  52. 2 2
      patches/extra/ungoogled-chromium/enable-page-saving-on-more-pages.patch
  53. 2 2
      patches/extra/ungoogled-chromium/enable-paste-and-go-new-tab-button.patch
  54. 3 17
      patches/extra/ungoogled-chromium/remove-uneeded-ui.patch
  55. 0 1
      patches/series
  56. 244 6
      pruning.list

+ 1 - 1
chromium_version.txt

@@ -1 +1 @@
-89.0.4389.114
+90.0.4430.72

+ 0 - 1
devutils/update_lists.py

@@ -63,7 +63,6 @@ PRUNING_EXCLUDE_PATTERNS = [
     'third_party/icu/android_small/icudtl.dat',
     'third_party/icu/android_small/icudtl_extra.dat',
     'third_party/icu/common/icudtb.dat',
-    'third_party/jetifier_standalone/lib/jetifier-standalone.jar',
     # Exclusions for safe file extensions
     '*.avif',
     '*.ttf',

File diff suppressed because it is too large
+ 118 - 143
domain_substitution.list


+ 1 - 0
flags.gn

@@ -1,3 +1,4 @@
+build_with_tflite_lib=false
 chrome_pgo_phase=0
 clang_use_chrome_plugins=false
 enable_hangout_services_extension=false

+ 6 - 6
patches/core/bromite/disable-fetching-field-trials.patch

@@ -10,7 +10,7 @@ Subject: Disable fetching of all field trials
 
 --- a/chrome/browser/flags/android/java/src/org/chromium/chrome/browser/flags/ChromeFeatureList.java
 +++ b/chrome/browser/flags/android/java/src/org/chromium/chrome/browser/flags/ChromeFeatureList.java
-@@ -122,9 +122,7 @@ public abstract class ChromeFeatureList
+@@ -123,9 +123,7 @@ public abstract class ChromeFeatureList
       *   the specified parameter does not exist.
       */
      public static String getFieldTrialParamByFeature(String featureName, String paramName) {
@@ -21,7 +21,7 @@ Subject: Disable fetching of all field trials
      }
  
      /**
-@@ -141,10 +139,7 @@ public abstract class ChromeFeatureList
+@@ -142,10 +140,7 @@ public abstract class ChromeFeatureList
       */
      public static int getFieldTrialParamByFeatureAsInt(
              String featureName, String paramName, int defaultValue) {
@@ -33,7 +33,7 @@ Subject: Disable fetching of all field trials
      }
  
      /**
-@@ -161,10 +156,7 @@ public abstract class ChromeFeatureList
+@@ -162,10 +157,7 @@ public abstract class ChromeFeatureList
       */
      public static double getFieldTrialParamByFeatureAsDouble(
              String featureName, String paramName, double defaultValue) {
@@ -45,7 +45,7 @@ Subject: Disable fetching of all field trials
      }
  
      /**
-@@ -181,10 +173,7 @@ public abstract class ChromeFeatureList
+@@ -196,10 +188,7 @@ public abstract class ChromeFeatureList
       */
      public static boolean getFieldTrialParamByFeatureAsBoolean(
              String featureName, String paramName, boolean defaultValue) {
@@ -56,10 +56,10 @@ Subject: Disable fetching of all field trials
 +        return defaultValue;
      }
  
-     /** Alphabetical: */
+     /* Alphabetical: */
 --- a/components/variations/service/variations_service.cc
 +++ b/components/variations/service/variations_service.cc
-@@ -239,17 +239,7 @@ bool GetInstanceManipulations(const net:
+@@ -240,17 +240,7 @@ bool GetInstanceManipulations(const net:
  // Variations seed fetching is only enabled in official Chrome builds, if a URL
  // is specified on the command line, and for testing.
  bool IsFetchingEnabled() {

+ 41 - 40
patches/core/inox-patchset/0001-fix-building-without-safebrowsing.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -3539,8 +3539,6 @@ static_library("browser") {
+@@ -3540,8 +3540,6 @@ static_library("browser") {
        "download/download_commands.h",
        "download/download_crx_util.cc",
        "download/download_crx_util.h",
@@ -22,7 +22,7 @@
  namespace subresource_filter {
  class RulesetService;
  }
-@@ -212,9 +208,6 @@ class BrowserProcess {
+@@ -209,9 +205,6 @@ class BrowserProcess {
    // on this platform (or this is a unit test).
    virtual StatusTray* status_tray() = 0;
  
@@ -42,7 +42,7 @@
  #include "chrome/browser/shell_integration.h"
  #include "chrome/browser/site_isolation/prefs_observer.h"
  #include "chrome/browser/ssl/secure_origin_prefs_observer.h"
-@@ -376,8 +375,6 @@ void BrowserProcessImpl::StartTearDown()
+@@ -367,8 +366,6 @@ void BrowserProcessImpl::StartTearDown()
  
    metrics_services_manager_.reset();
    intranet_redirect_detector_.reset();
@@ -51,7 +51,7 @@
    network_time_tracker_.reset();
  #if BUILDFLAG(ENABLE_PLUGINS)
    plugins_resource_service_.reset();
-@@ -983,14 +980,6 @@ StatusTray* BrowserProcessImpl::status_t
+@@ -968,14 +965,6 @@ StatusTray* BrowserProcessImpl::status_t
    return status_tray_.get();
  }
  
@@ -66,7 +66,7 @@
  subresource_filter::RulesetService*
  BrowserProcessImpl::subresource_filter_ruleset_service() {
    DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
-@@ -1229,26 +1218,6 @@ void BrowserProcessImpl::CreateBackgroun
+@@ -1225,26 +1214,6 @@ void BrowserProcessImpl::CreateBackgroun
  #endif
  }
  
@@ -95,15 +95,15 @@
    created_subresource_filter_ruleset_service_ = true;
 --- a/chrome/browser/browser_process_impl.h
 +++ b/chrome/browser/browser_process_impl.h
-@@ -170,7 +170,6 @@ class BrowserProcessImpl : public Browse
-   void set_background_mode_manager_for_test(
+@@ -175,7 +175,6 @@ class BrowserProcessImpl : public Browse
        std::unique_ptr<BackgroundModeManager> manager) override;
+ #endif
    StatusTray* status_tray() override;
 -  safe_browsing::SafeBrowsingService* safe_browsing_service() override;
    subresource_filter::RulesetService* subresource_filter_ruleset_service()
        override;
    federated_learning::FlocSortingLshClustersService*
-@@ -318,9 +317,6 @@ class BrowserProcessImpl : public Browse
+@@ -323,9 +322,6 @@ class BrowserProcessImpl : public Browse
    std::unique_ptr<BackgroundModeManager> background_mode_manager_;
  #endif
  
@@ -115,7 +115,7 @@
        subresource_filter_ruleset_service_;
 --- a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
 +++ b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
-@@ -73,7 +73,6 @@
+@@ -72,7 +72,6 @@
  #include "chrome/browser/privacy_sandbox/privacy_sandbox_settings.h"
  #include "chrome/browser/privacy_sandbox/privacy_sandbox_settings_factory.h"
  #include "chrome/browser/profiles/profile.h"
@@ -123,7 +123,7 @@
  #include "chrome/browser/search_engines/template_url_service_factory.h"
  #include "chrome/browser/spellchecker/spellcheck_factory.h"
  #include "chrome/browser/spellchecker/spellcheck_service.h"
-@@ -669,10 +668,6 @@ void ChromeBrowsingDataRemoverDelegate::
+@@ -668,10 +667,6 @@ void ChromeBrowsingDataRemoverDelegate::
      base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
  
      network::mojom::NetworkContext* safe_browsing_context = nullptr;
@@ -136,7 +136,7 @@
          delete_begin, delete_end, filter_builder, host_content_settings_map_,
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -920,30 +920,6 @@ void SetApplicationLocaleOnIOThread(cons
+@@ -957,30 +957,6 @@ void SetApplicationLocaleOnIOThread(cons
    GetIOThreadApplicationLocale() = locale;
  }
  
@@ -167,7 +167,7 @@
  #if BUILDFLAG(ENABLE_EXTENSIONS)
  
  AppLoadedInTabSource ClassifyAppLoadedInTabSource(
-@@ -1491,7 +1467,6 @@ void ChromeContentBrowserClient::PostAft
+@@ -1402,7 +1378,6 @@ void ChromeContentBrowserClient::PostAft
    InitNetworkContextsParentDirectory();
  
    DCHECK_CURRENTLY_ON(BrowserThread::UI);
@@ -175,7 +175,7 @@
  }
  
  bool ChromeContentBrowserClient::IsBrowserStartupComplete() {
-@@ -4131,7 +4106,7 @@ ChromeContentBrowserClient::CreateThrott
+@@ -4109,7 +4084,7 @@ ChromeContentBrowserClient::CreateThrott
        base::BindRepeating(&MaybeTriggerSecurityInterstitialShownEvent));
    throttles.push_back(std::make_unique<SSLErrorNavigationThrottle>(
        handle,
@@ -184,7 +184,7 @@
        base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
        base::BindOnce(
            &TypedNavigationUpgradeThrottle::
-@@ -4153,9 +4128,6 @@ ChromeContentBrowserClient::CreateThrott
+@@ -4131,9 +4106,6 @@ ChromeContentBrowserClient::CreateThrott
                     &throttles);
  #endif
  
@@ -219,7 +219,7 @@
  }  // namespace
 --- a/chrome/browser/download/chrome_download_manager_delegate.cc
 +++ b/chrome/browser/download/chrome_download_manager_delegate.cc
-@@ -393,13 +393,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
+@@ -394,13 +394,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
  
  void ChromeDownloadManagerDelegate::SetDownloadManager(DownloadManager* dm) {
    download_manager_ = dm;
@@ -233,7 +233,7 @@
  }
  
  #if defined(OS_ANDROID)
-@@ -740,16 +733,6 @@ void ChromeDownloadManagerDelegate::Choo
+@@ -741,16 +734,6 @@ void ChromeDownloadManagerDelegate::Choo
  
  void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
      base::FilePath* filename) {
@@ -332,7 +332,7 @@
        download_->GetURL(), download_->GetContentDisposition(), referrer_charset,
        suggested_filename, sniffed_mime_type, default_filename);
  
--  // We don't replace the file extension if safe browsing consider the file
+-  // We don't replace the file extension if sfafe browsing consider the file
 -  // extension to be unsafe. Just let safe browsing scan the generated file.
 -  if (safe_browsing::FileTypePolicies::GetInstance()->IsCheckedBinaryFile(
 -          generated_filename)) {
@@ -342,7 +342,7 @@
    // If no mime type or explicitly specified a name, don't replace file
    // extension.
    if (sniffed_mime_type.empty() || !suggested_filename.empty())
-@@ -1090,29 +1083,7 @@ DownloadFileType::DangerLevel DownloadTa
+@@ -1097,29 +1090,7 @@ DownloadFileType::DangerLevel DownloadTa
        download_->HasUserGesture())
      return DownloadFileType::NOT_DANGEROUS;
  
@@ -383,7 +383,7 @@
  #include "chrome/browser/download/download_file_icon_extractor.h"
  #include "chrome/browser/download/download_open_prompt.h"
  #include "chrome/browser/download/download_prefs.h"
-@@ -1312,9 +1311,6 @@ DownloadsAcceptDangerFunction::Downloads
+@@ -1307,9 +1306,6 @@ DownloadsAcceptDangerFunction::Downloads
  
  DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
  
@@ -393,7 +393,7 @@
  ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
    std::unique_ptr<downloads::AcceptDanger::Params> params(
        downloads::AcceptDanger::Params::Create(*args_));
-@@ -1352,41 +1348,7 @@ void DownloadsAcceptDangerFunction::Prom
+@@ -1347,41 +1343,7 @@ void DownloadsAcceptDangerFunction::Prom
      return;
    }
    RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
@@ -405,7 +405,7 @@
 -                     download_id));
 -  // DownloadDangerPrompt deletes itself
 -  if (on_prompt_created_ && !on_prompt_created_->is_null())
--    on_prompt_created_->Run(prompt);
+-    std::move(*on_prompt_created_).Run(prompt);
 -  // Function finishes in DangerPromptCallback().
 -}
 -
@@ -446,11 +446,12 @@
  #include "chrome/common/extensions/api/downloads.h"
  #include "components/download/content/public/all_download_item_notifier.h"
  #include "components/download/public/common/download_path_reservation_tracker.h"
-@@ -187,25 +186,16 @@ class DownloadsRemoveFileFunction : publ
+@@ -187,26 +186,16 @@ class DownloadsRemoveFileFunction : publ
  
  class DownloadsAcceptDangerFunction : public ExtensionFunction {
   public:
--  typedef base::Callback<void(DownloadDangerPrompt*)> OnPromptCreatedCallback;
+-  using OnPromptCreatedCallback =
+-      base::OnceCallback<void(DownloadDangerPrompt*)>;
 -  static void OnPromptCreatedForTesting(
 -      OnPromptCreatedCallback* callback) {
 -    on_prompt_created_ = callback;
@@ -649,7 +650,7 @@
    // SimpleURLLoader -> (owned loader, extension id).
 --- a/chrome/browser/metrics/chrome_metrics_service_client.cc
 +++ b/chrome/browser/metrics/chrome_metrics_service_client.cc
-@@ -780,9 +780,6 @@ void ChromeMetricsServiceClient::Registe
+@@ -796,9 +796,6 @@ void ChromeMetricsServiceClient::Registe
    metrics_service_->RegisterMetricsProvider(
        std::make_unique<HttpsEngagementMetricsProvider>());
  
@@ -673,9 +674,9 @@
  // static
 --- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
 +++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
-@@ -264,7 +264,6 @@ void ChromeBrowserMainExtraPartsProfiles
- #if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
-   CaptivePortalServiceFactory::GetInstance();
+@@ -272,7 +272,6 @@ void ChromeBrowserMainExtraPartsProfiles
+ #if BUILDFLAG(IS_CHROMEOS_LACROS)
+   CertDbInitializerFactory::GetInstance();
  #endif
 -  CertificateReportingServiceFactory::GetInstance();
  #if !defined(OS_ANDROID)
@@ -683,7 +684,7 @@
  #endif
 --- a/chrome/browser/profiles/profile_impl.cc
 +++ b/chrome/browser/profiles/profile_impl.cc
-@@ -94,7 +94,6 @@
+@@ -93,7 +93,6 @@
  #include "chrome/browser/profiles/profile_metrics.h"
  #include "chrome/browser/push_messaging/push_messaging_service_factory.h"
  #include "chrome/browser/push_messaging/push_messaging_service_impl.h"
@@ -691,7 +692,7 @@
  #include "chrome/browser/sharing/sharing_service_factory.h"
  #include "chrome/browser/signin/identity_manager_factory.h"
  #include "chrome/browser/signin/signin_ui_util.h"
-@@ -639,17 +638,6 @@ void ProfileImpl::LoadPrefsForNormalStar
+@@ -629,17 +628,6 @@ void ProfileImpl::LoadPrefsForNormalStar
  
    mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
        pref_validation_delegate;
@@ -711,7 +712,7 @@
        CreatePrefService(pref_registry_, CreateExtensionPrefStore(this, false),
 --- a/chrome/browser/profiles/profiles_state.cc
 +++ b/chrome/browser/profiles/profiles_state.cc
-@@ -248,9 +248,6 @@ void RemoveBrowsingDataForProfile(const
+@@ -249,9 +249,6 @@ void RemoveBrowsingDataForProfile(const
    // The BrowsingDataRemover relies on many objects that aren't created in unit
    // tests. Previously this code would depend on content::ResourceDispatcherHost
    // but that's gone, so do a similar hack for now.
@@ -731,9 +732,9 @@
    sources = [
      "chrome_controller_client.cc",
      "chrome_controller_client.h",
-@@ -68,6 +69,7 @@ static_library("safe_browsing") {
-     }
-     deps += [ "//extensions/browser" ]
+@@ -82,6 +83,7 @@ static_library("safe_browsing") {
+       "//extensions/browser",
+     ]
    }
 +  }
  
@@ -741,7 +742,7 @@
      # "Safe Browsing Basic" files used for safe browsing in full mode
 --- a/chrome/browser/ssl/security_state_tab_helper.cc
 +++ b/chrome/browser/ssl/security_state_tab_helper.cc
-@@ -275,92 +275,6 @@ bool SecurityStateTabHelper::UsedPolicyI
+@@ -257,92 +257,6 @@ bool SecurityStateTabHelper::UsedPolicyI
  
  security_state::MaliciousContentStatus
  SecurityStateTabHelper::GetMaliciousContentStatus() const {
@@ -755,7 +756,7 @@
 -    return security_state::MALICIOUS_CONTENT_STATUS_NONE;
 -  scoped_refptr<SafeBrowsingUIManager> sb_ui_manager = sb_service->ui_manager();
 -  safe_browsing::SBThreatType threat_type;
--  if (sb_ui_manager->IsUrlWhitelistedOrPendingForWebContents(
+-  if (sb_ui_manager->IsUrlAllowlistedOrPendingForWebContents(
 -          entry->GetURL(), false, entry, web_contents(), false, &threat_type)) {
 -    switch (threat_type) {
 -      case safe_browsing::SB_THREAT_TYPE_UNUSED:
@@ -814,10 +815,10 @@
 -          DEPRECATED_SB_THREAT_TYPE_URL_PASSWORD_PROTECTION_PHISHING:
 -      case safe_browsing::SB_THREAT_TYPE_URL_BINARY_MALWARE:
 -      case safe_browsing::SB_THREAT_TYPE_EXTENSION:
--      case safe_browsing::SB_THREAT_TYPE_BLACKLISTED_RESOURCE:
+-      case safe_browsing::SB_THREAT_TYPE_BLOCKLISTED_RESOURCE:
 -      case safe_browsing::SB_THREAT_TYPE_API_ABUSE:
 -      case safe_browsing::SB_THREAT_TYPE_SUBRESOURCE_FILTER:
--      case safe_browsing::SB_THREAT_TYPE_CSD_WHITELIST:
+-      case safe_browsing::SB_THREAT_TYPE_CSD_ALLOWLIST:
 -      case safe_browsing::SB_THREAT_TYPE_AD_SAMPLE:
 -      case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_POPUP:
 -      case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_REDIRECT:
@@ -836,7 +837,7 @@
  
 --- a/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
 +++ b/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
-@@ -110,10 +110,7 @@ void ChromeSubresourceFilterClient::OnAd
+@@ -57,10 +57,7 @@ void ChromeSubresourceFilterClient::Show
  
  const scoped_refptr<safe_browsing::SafeBrowsingDatabaseManager>
  ChromeSubresourceFilterClient::GetSafeBrowsingDatabaseManager() {
@@ -850,7 +851,7 @@
  subresource_filter::ProfileInteractionManager*
 --- a/chrome/browser/ui/BUILD.gn
 +++ b/chrome/browser/ui/BUILD.gn
-@@ -3586,7 +3586,6 @@ static_library("ui") {
+@@ -3640,7 +3640,6 @@ static_library("ui") {
        "views/device_chooser_content_view.h",
        "views/devtools_process_observer.cc",
        "views/devtools_process_observer.h",
@@ -860,7 +861,7 @@
        "views/download/download_item_view.cc",
 --- a/chrome/browser/ui/tab_helpers.cc
 +++ b/chrome/browser/ui/tab_helpers.cc
-@@ -314,11 +314,6 @@ void TabHelpers::AttachTabHelpers(WebCon
+@@ -317,11 +317,6 @@ void TabHelpers::AttachTabHelpers(WebCon
    resource_coordinator::ResourceCoordinatorTabHelper::CreateForWebContents(
        web_contents);
    ResourceLoadingHintsWebContentsObserver::CreateForWebContents(web_contents);

+ 1 - 1
patches/core/inox-patchset/0003-disable-autofill-download-manager.patch

@@ -1,6 +1,6 @@
 --- a/components/autofill/core/browser/autofill_download_manager.cc
 +++ b/components/autofill/core/browser/autofill_download_manager.cc
-@@ -826,87 +826,6 @@ AutofillDownloadManager::GetRequestURLAn
+@@ -831,87 +831,6 @@ AutofillDownloadManager::GetRequestURLAn
  }
  
  bool AutofillDownloadManager::StartRequest(FormRequestData request_data) {

+ 10 - 10
patches/core/inox-patchset/0005-disable-default-extensions.patch

@@ -1,16 +1,16 @@
 --- a/chrome/browser/extensions/component_extensions_allowlist/allowlist.cc
 +++ b/chrome/browser/extensions/component_extensions_allowlist/allowlist.cc
-@@ -27,7 +27,6 @@ namespace extensions {
- 
+@@ -28,7 +28,6 @@ namespace extensions {
  bool IsComponentExtensionAllowlisted(const std::string& extension_id) {
    const char* const kAllowed[] = {
--    extension_misc::kInAppPaymentsSupportAppId,
      extension_misc::kCastExtensionIdRelease,
+-    extension_misc::kInAppPaymentsSupportAppId,
      extension_misc::kPdfExtensionId,
  #if BUILDFLAG(IS_CHROMEOS_ASH)
+     extension_misc::kAccessibilityCommonExtensionId,
 --- a/chrome/browser/extensions/component_loader.cc
 +++ b/chrome/browser/extensions/component_loader.cc
-@@ -350,11 +350,6 @@ void ComponentLoader::AddWebStoreApp() {
+@@ -352,11 +352,6 @@ void ComponentLoader::AddWebStoreApp() {
    if (!IsNormalSession())
      return;
  #endif
@@ -22,7 +22,7 @@
  }
  
  #if BUILDFLAG(IS_CHROMEOS_ASH)
-@@ -521,18 +516,6 @@ void ComponentLoader::AddDefaultComponen
+@@ -526,18 +521,6 @@ void ComponentLoader::AddDefaultComponen
      AddHangoutServicesExtension();
  #endif  // BUILDFLAG(ENABLE_HANGOUT_SERVICES_EXTENSION)
  
@@ -39,11 +39,11 @@
 -    }
 -
  #if BUILDFLAG(IS_CHROMEOS_ASH)
-     AddChromeCameraApp();
-     AddVideoPlayerExtension();
+     if (command_line->HasSwitch(switches::kLoadGuestModeTestExtension)) {
+       base::FilePath path = base::FilePath(command_line->GetSwitchValueASCII(
 --- a/chrome/browser/extensions/external_component_loader.cc
 +++ b/chrome/browser/extensions/external_component_loader.cc
-@@ -32,9 +32,6 @@ ExternalComponentLoader::~ExternalCompon
+@@ -31,9 +31,6 @@ ExternalComponentLoader::~ExternalCompon
  
  void ExternalComponentLoader::StartLoading() {
    auto prefs = std::make_unique<base::DictionaryValue>();
@@ -55,7 +55,7 @@
    {
 --- a/chrome/browser/extensions/webstore_installer.cc
 +++ b/chrome/browser/extensions/webstore_installer.cc
-@@ -552,20 +552,6 @@ void WebstoreInstaller::DownloadNextPend
+@@ -551,20 +551,6 @@ void WebstoreInstaller::DownloadNextPend
  void WebstoreInstaller::DownloadCrx(
      const std::string& extension_id,
      InstallSource source) {
@@ -76,7 +76,7 @@
  }
  
  // http://crbug.com/165634
-@@ -710,21 +696,6 @@ void WebstoreInstaller::UpdateDownloadPr
+@@ -709,21 +695,6 @@ void WebstoreInstaller::UpdateDownloadPr
  void WebstoreInstaller::StartCrxInstaller(const DownloadItem& download) {
    DCHECK_CURRENTLY_ON(BrowserThread::UI);
    DCHECK(!crx_installer_.get());

+ 1 - 1
patches/core/inox-patchset/0015-disable-update-pings.patch

@@ -1,6 +1,6 @@
 --- a/chrome/updater/configurator.cc
 +++ b/chrome/updater/configurator.cc
-@@ -67,7 +67,7 @@ int Configurator::UpdateDelay() const {
+@@ -74,7 +74,7 @@ int Configurator::UpdateDelay() const {
  }
  
  std::vector<GURL> Configurator::UpdateUrl() const {

+ 1 - 1
patches/core/inox-patchset/0021-disable-rlz.patch

@@ -2,7 +2,7 @@
 
 --- a/BUILD.gn
 +++ b/BUILD.gn
-@@ -449,14 +449,6 @@ group("gn_all") {
+@@ -453,14 +453,6 @@ group("gn_all") {
      ]
    }
  

+ 125 - 39
patches/core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch

@@ -45,7 +45,6 @@ by default.
  .../core/browser/web_history_service.cc       |  6 +++---
  components/metrics/url_constants.cc           |  2 +-
  .../core/browser/password_store.cc            |  8 ++++----
- components/rappor/rappor_service_impl.cc      |  2 +-
  .../safe_search_url_checker_client.cc         |  2 +-
  .../safe_search_api/stub_url_checker.cc       |  2 +-
  .../core/browser/translate_url_fetcher.cc     |  1 +
@@ -91,7 +90,7 @@ by default.
  // creates and uses to publish OEM default apps to the extensions system.
 --- a/chrome/browser/chromeos/extensions/file_manager/private_api_drive.cc
 +++ b/chrome/browser/chromeos/extensions/file_manager/private_api_drive.cc
-@@ -860,7 +860,7 @@ void FileManagerPrivateInternalGetDownlo
+@@ -863,7 +863,7 @@ void FileManagerPrivateInternalGetDownlo
    const CoreAccountId& account_id =
        identity_manager->GetPrimaryAccountId(signin::ConsentLevel::kNotRequired);
    std::vector<std::string> scopes;
@@ -102,7 +101,7 @@ by default.
        content::BrowserContext::GetDefaultStoragePartition(
 --- a/chrome/browser/chromeos/extensions/file_manager/private_api_misc.cc
 +++ b/chrome/browser/chromeos/extensions/file_manager/private_api_misc.cc
-@@ -82,7 +82,7 @@ namespace {
+@@ -81,7 +81,7 @@ namespace {
  
  using api::file_manager_private::ProfileInfo;
  
@@ -276,7 +275,7 @@ by default.
  // The maximum number of ignored bubble we track in the NumLaterPerReinstall
 --- a/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
 +++ b/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
-@@ -81,22 +81,22 @@ namespace {
+@@ -71,22 +71,22 @@ namespace {
  // The URL for the the Learn More page shown on incognito new tab.
  const char kLearnMoreIncognitoUrl[] =
  #if BUILDFLAG(IS_CHROMEOS_ASH)
@@ -345,12 +344,12 @@ by default.
 @@ -37,7 +37,7 @@ namespace installer {
  namespace {
  
- constexpr base::StringPiece16 kUninstallSurveyUrl(
+ constexpr base::WStringPiece kUninstallSurveyUrl(
 -    L"https://support.google.com/chrome?p=chrome_uninstall_survey");
 +    L"trk:253:https://support.google.com/chrome?p=chrome_uninstall_survey");
  
- bool NavigateToUrlWithEdge(const base::string16& url) {
-   base::string16 protocol_url = L"microsoft-edge:" + url;
+ bool NavigateToUrlWithEdge(const std::wstring& url) {
+   std::wstring protocol_url = L"microsoft-edge:" + url;
 --- a/chromecast/browser/service/cast_service_simple.cc
 +++ b/chromecast/browser/service/cast_service_simple.cc
 @@ -27,7 +27,7 @@ GURL GetStartupURL() {
@@ -419,7 +418,7 @@ by default.
  // Mime type to create a directory.
 --- a/components/feedback/feedback_uploader.cc
 +++ b/components/feedback/feedback_uploader.cc
-@@ -25,7 +25,7 @@ constexpr base::FilePath::CharType kFeed
+@@ -26,7 +26,7 @@ constexpr base::FilePath::CharType kFeed
      FILE_PATH_LITERAL("Feedback Reports");
  
  constexpr char kFeedbackPostUrl[] =
@@ -485,7 +484,7 @@ by default.
      "http://clientservices.googleapis.com/uma/v2";
 --- a/components/password_manager/core/browser/password_store.cc
 +++ b/components/password_manager/core/browser/password_store.cc
-@@ -298,10 +298,10 @@ void PasswordStore::GetLogins(const Form
+@@ -297,10 +297,10 @@ void PasswordStore::GetLogins(const Form
    // TODO(mdm): actually delete them at some point, say M24 or so.
    base::Time cutoff;  // the null time
    if (form.scheme == PasswordForm::Scheme::kHtml &&
@@ -500,17 +499,6 @@ by default.
      static const base::Time::Exploded exploded_cutoff = {
          2012, 1, 0, 1, 0, 0, 0, 0};  // 00:00 Jan 1 2012
      base::Time out_time;
---- a/components/rappor/rappor_service_impl.cc
-+++ b/components/rappor/rappor_service_impl.cc
-@@ -32,7 +32,7 @@ const char kMimeType[] = "application/vn
- const char kRapporDailyEventHistogram[] = "Rappor.DailyEvent.IntervalType";
- 
- // The rappor server's URL.
--const char kDefaultServerUrl[] = "https://clients4.google.com/rappor";
-+const char kDefaultServerUrl[] = "trk:266:https://clients4.google.com/rappor";
- 
- }  // namespace
- 
 --- a/components/safe_browsing/content/browser/client_side_detection_service.cc
 +++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
 @@ -53,7 +53,7 @@ const int ClientSideDetectionService::kN
@@ -589,7 +577,7 @@ by default.
  
 --- a/content/browser/webauth/authenticator_common.cc
 +++ b/content/browser/webauth/authenticator_common.cc
-@@ -167,9 +167,9 @@ base::Optional<std::string> ProcessAppId
+@@ -171,9 +171,9 @@ base::Optional<std::string> ProcessAppId
    // special-case AppIDs. Firefox also does this:
    // https://groups.google.com/forum/#!msg/mozilla.dev.platform/Uiu3fwnA2xw/201ynAiPAQAJ
    const GURL kGstatic1 =
@@ -603,15 +591,15 @@ by default.
    if (origin.DomainIs("google.com") && !appid_url.has_ref() &&
 --- a/content/shell/browser/shell_browser_main_parts.cc
 +++ b/content/shell/browser/shell_browser_main_parts.cc
-@@ -88,7 +88,7 @@ GURL GetStartupURL() {
+@@ -89,7 +89,7 @@ GURL GetStartupURL() {
  #else
    const base::CommandLine::StringVector& args = command_line->GetArgs();
    if (args.empty())
 -    return GURL("https://www.google.com/");
 +    return GURL("trk:183:https://www.google.com/");
  
-   GURL url(args[0]);
-   if (url.is_valid() && url.has_scheme())
+ #if defined(OS_WIN)
+   GURL url(base::WideToUTF16(args[0]));
 --- a/extensions/common/extension_urls.cc
 +++ b/extensions/common/extension_urls.cc
 @@ -26,9 +26,9 @@ bool IsSourceFromAnExtension(const base:
@@ -628,57 +616,155 @@ by default.
    extensions::ExtensionsClient* client = extensions::ExtensionsClient::Get();
 --- a/google_apis/gaia/gaia_constants.cc
 +++ b/google_apis/gaia/gaia_constants.cc
-@@ -25,23 +25,23 @@ const char kSyncService[] = "chromiumsyn
+@@ -25,117 +25,117 @@ const char kSyncService[] = "chromiumsyn
  const char kRemotingService[] = "chromoting";
  
  // OAuth scopes.
 -const char kOAuth1LoginScope[] = "https://www.google.com/accounts/OAuthLogin";
-+const char kOAuth1LoginScope[] = "trk:181:https://www.google.com/accounts/OAuthLogin";
- const char kOAuthWrapBridgeUserInfoScope[] =
--    "https://www.googleapis.com/auth/userinfo.email";
-+    "trk:101:https://www.googleapis.com/auth/userinfo.email";
++const char kOAuth1LoginScope[] = "trk:069:https://www.google.com/accounts/OAuthLogin";
  
  // Service/scope names for device management (cloud-based policy) server.
  const char kDeviceManagementServiceOAuth[] =
 -    "https://www.googleapis.com/auth/chromeosdevicemanagement";
-+    "trk:102:https://www.googleapis.com/auth/chromeosdevicemanagement";
++    "trk:070:https://www.googleapis.com/auth/chromeosdevicemanagement";
  
  // OAuth2 scope for access to all Google APIs.
 -const char kAnyApiOAuth2Scope[] = "https://www.googleapis.com/auth/any-api";
-+const char kAnyApiOAuth2Scope[] = "trk:103:https://www.googleapis.com/auth/any-api";
++const char kAnyApiOAuth2Scope[] = "trk:071:https://www.googleapis.com/auth/any-api";
  
  // OAuth2 scope for access to Chrome sync APIs
  const char kChromeSyncOAuth2Scope[] =
 -    "https://www.googleapis.com/auth/chromesync";
-+    "trk:104:https://www.googleapis.com/auth/chromesync";
++    "trk:072:https://www.googleapis.com/auth/chromesync";
  // OAuth2 scope for access to the Chrome Sync APIs for managed profiles.
  const char kChromeSyncSupervisedOAuth2Scope[] =
 -    "https://www.googleapis.com/auth/chromesync_playpen";
-+    "trk:105:https://www.googleapis.com/auth/chromesync_playpen";
++    "trk:073:https://www.googleapis.com/auth/chromesync_playpen";
  
  // OAuth2 scope for access to Kid Management API.
  const char kKidManagementOAuth2Scope[] =
-@@ -53,16 +53,16 @@ const char kKidManagementPrivilegedOAuth
+-    "https://www.googleapis.com/auth/kid.management";
++    "trk:074:https://www.googleapis.com/auth/kid.management";
+ 
+ // OAuth2 scope for parental consent logging for secondary account addition.
+ const char kKidManagementPrivilegedOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/kid.management.privileged";
++    "trk:075:https://www.googleapis.com/auth/kid.management.privileged";
  
  // OAuth2 scope for access to Google Family Link Supervision Setup.
  const char kKidsSupervisionSetupChildOAuth2Scope[] =
 -    "https://www.googleapis.com/auth/kids.supervision.setup.child";
-+    "trk:262:https://www.googleapis.com/auth/kids.supervision.setup.child";
++    "trk:076:https://www.googleapis.com/auth/kids.supervision.setup.child";
  
  // OAuth2 scope for access to Google Talk APIs (XMPP).
  const char kGoogleTalkOAuth2Scope[] =
 -    "https://www.googleapis.com/auth/googletalk";
-+    "trk:106:https://www.googleapis.com/auth/googletalk";
++    "trk:077:https://www.googleapis.com/auth/googletalk";
  
+ // OAuth2 scope for access to Google account information.
  const char kGoogleUserInfoEmail[] =
 -    "https://www.googleapis.com/auth/userinfo.email";
-+    "trk:107:https://www.googleapis.com/auth/userinfo.email";
++    "trk:078:https://www.googleapis.com/auth/userinfo.email";
  const char kGoogleUserInfoProfile[] =
 -    "https://www.googleapis.com/auth/userinfo.profile";
-+    "trk:260:https://www.googleapis.com/auth/userinfo.profile";
++    "trk:079:https://www.googleapis.com/auth/userinfo.profile";
  
- // OAuth scope for access to the people API (read-only).
+ // OAuth2 scope for access to the people API (read-only).
  const char kPeopleApiReadOnlyOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/peopleapi.readonly";
++    "trk:080:https://www.googleapis.com/auth/peopleapi.readonly";
+ 
+ // OAuth2 scope for access to the Reauth flow.
+ const char kAccountsReauthOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/accounts.reauth";
++    "trk:081:https://www.googleapis.com/auth/accounts.reauth";
+ 
+ // OAuth2 scope for access to audit recording (ARI).
+ const char kAuditRecordingOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/auditrecording-pa";
++    "trk:082:https://www.googleapis.com/auth/auditrecording-pa";
+ 
+ // OAuth2 scope for access to clear cut logs.
+-const char kClearCutOAuth2Scope[] = "https://www.googleapis.com/auth/cclog";
++const char kClearCutOAuth2Scope[] = "trk:083:https://www.googleapis.com/auth/cclog";
+ 
+ // OAuth2 scope for FCM, the Firebase Cloud Messaging service.
+ const char kFCMOAuthScope[] =
+-    "https://www.googleapis.com/auth/firebase.messaging";
++    "trk:084:https://www.googleapis.com/auth/firebase.messaging";
+ 
+ // OAuth2 scope for access to Tachyon api.
+-const char kTachyonOAuthScope[] = "https://www.googleapis.com/auth/tachyon";
++const char kTachyonOAuthScope[] = "trk:085:https://www.googleapis.com/auth/tachyon";
+ 
+ // OAuth2 scope for access to the Photos API.
+-const char kPhotosOAuth2Scope[] = "https://www.googleapis.com/auth/photos";
++const char kPhotosOAuth2Scope[] = "trk:086:https://www.googleapis.com/auth/photos";
+ 
+ // OAuth2 scope for access to Cast backdrop API.
+ const char kCastBackdropOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/cast.backdrop";
++    "trk:087:https://www.googleapis.com/auth/cast.backdrop";
+ 
+ // OAuth scope for access to Cloud Translation API.
+ const char kCloudTranslationOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/cloud-translation";
++    "trk:088:https://www.googleapis.com/auth/cloud-translation";
+ 
+ // OAuth2 scope for access to passwords leak checking API.
+ const char kPasswordsLeakCheckOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/identity.passwords.leak.check";
++    "trk:089:https://www.googleapis.com/auth/identity.passwords.leak.check";
+ 
+ // OAuth2 scope for access to Chrome safe browsing API.
+ const char kChromeSafeBrowsingOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/chrome-safe-browsing";
++    "trk:090:https://www.googleapis.com/auth/chrome-safe-browsing";
+ 
+ // OAuth2 scope for access to kid permissions by URL.
+ const char kClassifyUrlKidPermissionOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/kid.permission";
++    "trk:091:https://www.googleapis.com/auth/kid.permission";
+ const char kKidFamilyReadonlyOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/kid.family.readonly";
++    "trk:092https://www.googleapis.com/auth/kid.family.readonly";
+ 
+ // OAuth2 scope for access to payments.
+ const char kPaymentsOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/wallet.chrome";
++    "trk:093:https://www.googleapis.com/auth/wallet.chrome";
+ 
+ const char kCryptAuthOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/cryptauth";
++    "trk:094:https://www.googleapis.com/auth/cryptauth";
+ 
+ // OAuth2 scope for access to Drive.
+ const char kDriveOAuth2Scope[] = "https://www.googleapis.com/auth/drive";
+ const char kDriveReadOnlyOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/drive.readonly";
++    "trk:095:https://www.googleapis.com/auth/drive.readonly";
+ 
+ // OAuth2 scope for access to Assistant SDK.
+ const char kAssistantOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/assistant-sdk-prototype";
++    "trk:096:https://www.googleapis.com/auth/assistant-sdk-prototype";
+ 
+ // OAuth2 scope for access to nearby sharing.
+ const char kNearbyShareOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/nearbysharing-pa";
++    "trk:097:https://www.googleapis.com/auth/nearbysharing-pa";
+ 
+ // OAuth2 scope for access to GCM account tracker.
+-const char kGCMGroupServerOAuth2Scope[] = "https://www.googleapis.com/auth/gcm";
++const char kGCMGroupServerOAuth2Scope[] = "trk:098:https://www.googleapis.com/auth/gcm";
+ 
+ // OAuth2 scope for access to readonly Chrome web store.
+ const char kChromeWebstoreOAuth2Scope[] =
+-    "https://www.googleapis.com/auth/chromewebstore.readonly";
++    "trk:099:https://www.googleapis.com/auth/chromewebstore.readonly";
+ 
+ // Used to mint uber auth tokens when needed.
+ const char kGaiaSid[] = "sid";
 --- a/google_apis/gaia/gaia_urls.cc
 +++ b/google_apis/gaia/gaia_urls.cc
 @@ -23,6 +23,7 @@

+ 2 - 2
patches/core/iridium-browser/safe_browsing-disable-incident-reporting.patch

@@ -44,7 +44,7 @@ the URL so we get notified if this happens again in the future).
  IncidentReportingService::IncidentReportingService(
 --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
 +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
-@@ -65,8 +65,7 @@ class SafeBrowsingBlockingPageFactoryImp
+@@ -91,8 +91,7 @@ class SafeBrowsingBlockingPageFactoryImp
      PrefService* prefs =
          Profile::FromBrowserContext(web_contents->GetBrowserContext())
              ->GetPrefs();
@@ -56,7 +56,7 @@ the URL so we get notified if this happens again in the future).
  
 --- a/chrome/browser/safe_browsing/safe_browsing_service.cc
 +++ b/chrome/browser/safe_browsing/safe_browsing_service.cc
-@@ -260,7 +260,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
+@@ -261,7 +261,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
  }
  
  void SafeBrowsingService::RegisterAllDelayedAnalysis() {

+ 4 - 4
patches/core/iridium-browser/safe_browsing-disable-reporting-of-safebrowsing-over.patch

@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
 
 --- a/components/safe_browsing/content/browser/client_side_detection_service.cc
 +++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
-@@ -216,6 +216,10 @@ void ClientSideDetectionService::StartCl
+@@ -211,6 +211,10 @@ void ClientSideDetectionService::StartCl
      return;
    }
  
@@ -23,11 +23,11 @@ This prevents trk:148 (phishing) and trk:149 (malware).
 +#else
    // Fill in metadata about which model we used.
    request->set_model_filename(model_loader_->name());
-   if (is_extended_reporting || is_enhanced_reporting) {
-@@ -293,6 +297,7 @@ void ClientSideDetectionService::StartCl
+   *request->mutable_population() = delegate_->GetUserPopulation();
+@@ -275,6 +279,7 @@ void ClientSideDetectionService::StartCl
  
    // Record that we made a request
-   phishing_report_times_.push(base::Time::Now());
+   AddPhishingReport(base::Time::Now());
 +#endif
  }
  

+ 1 - 1
patches/core/ungoogled-chromium/block-requests.patch

@@ -15,7 +15,7 @@
    </script>
 --- a/chrome/browser/search/background/ntp_background_service.cc
 +++ b/chrome/browser/search/background/ntp_background_service.cc
-@@ -61,6 +61,7 @@ void NtpBackgroundService::Shutdown() {
+@@ -66,6 +66,7 @@ void NtpBackgroundService::Shutdown() {
  }
  
  void NtpBackgroundService::FetchCollectionInfo() {

+ 20 - 15
patches/core/ungoogled-chromium/block-trk-and-subdomains.patch

@@ -35,7 +35,7 @@
      GURL rewritten_tab_url = tab_url;
 --- a/components/omnibox/browser/autocomplete_input.cc
 +++ b/components/omnibox/browser/autocomplete_input.cc
-@@ -526,7 +526,8 @@ void AutocompleteInput::ParseForEmphasiz
+@@ -552,7 +552,8 @@ void AutocompleteInput::ParseForEmphasiz
    // For the view-source and blob schemes, we should emphasize the host of the
    // URL qualified by the view-source or blob prefix.
    if ((base::LowerCaseEqualsASCII(scheme_str, kViewSourceScheme) ||
@@ -45,20 +45,25 @@
        (static_cast<int>(text.length()) > after_scheme_and_colon)) {
      // Obtain the URL prefixed by view-source or blob and parse it.
      base::string16 real_url(text.substr(after_scheme_and_colon));
-@@ -599,7 +600,9 @@ int AutocompleteInput::NumNonHostCompone
+@@ -623,11 +624,15 @@ int AutocompleteInput::NumNonHostCompone
+ 
+ // static
  bool AutocompleteInput::HasHTTPScheme(const base::string16& input) {
-   std::string utf8_input(base::UTF16ToUTF8(input));
-   url::Component scheme;
--  if (url::FindAndCompareScheme(utf8_input, kViewSourceScheme, &scheme)) {
-+  if (url::FindAndCompareScheme(utf8_input, url::kTraceScheme, &scheme)) {
++  if (HasScheme(input, url::kTraceScheme))
 +    return false;
-+  } else if (url::FindAndCompareScheme(utf8_input, kViewSourceScheme, &scheme)) {
-     utf8_input.erase(0, scheme.end() + 1);
-   }
-   return url::FindAndCompareScheme(utf8_input, url::kHttpScheme, nullptr);
+   return HasScheme(input, url::kHttpScheme);
+ }
+ 
+ // static
+ bool AutocompleteInput::HasHTTPSScheme(const base::string16& input) {
++  if (HasScheme(input, url::kTraceScheme))
++    return false;
+   return HasScheme(input, url::kHttpsScheme);
+ }
+ 
 --- a/components/url_formatter/url_fixer.cc
 +++ b/components/url_formatter/url_fixer.cc
-@@ -560,6 +560,10 @@ GURL FixupURL(const std::string& text, c
+@@ -562,6 +562,10 @@ GURL FixupURL(const std::string& text, c
      }
    }
  
@@ -71,7 +76,7 @@
      return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
 --- a/content/browser/child_process_security_policy_impl.cc
 +++ b/content/browser/child_process_security_policy_impl.cc
-@@ -772,6 +772,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
+@@ -793,6 +793,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
  #endif  // BUILDFLAG(ENABLE_WEBSOCKETS)
    RegisterWebSafeScheme(url::kFtpScheme);
    RegisterWebSafeScheme(url::kDataScheme);
@@ -81,7 +86,7 @@
    // TODO(nick): https://crbug.com/651534 blob: and filesystem: schemes embed
 --- a/net/BUILD.gn
 +++ b/net/BUILD.gn
-@@ -1086,6 +1086,8 @@ component("net") {
+@@ -1075,6 +1075,8 @@ component("net") {
        "url_request/report_sender.h",
        "url_request/static_http_user_agent_settings.cc",
        "url_request/static_http_user_agent_settings.h",
@@ -211,9 +216,9 @@
  const char kQuicTransportScheme[] = "quic-transport";
  const char kTelScheme[] = "tel";
 +const char kTraceScheme[] = "trk";
+ const char kUrnScheme[] = "urn";
  const char kWsScheme[] = "ws";
  const char kWssScheme[] = "wss";
- 
 --- a/url/url_constants.h
 +++ b/url/url_constants.h
 @@ -32,6 +32,7 @@ COMPONENT_EXPORT(URL) extern const char
@@ -221,9 +226,9 @@
  COMPONENT_EXPORT(URL) extern const char kQuicTransportScheme[];
  COMPONENT_EXPORT(URL) extern const char kTelScheme[];
 +COMPONENT_EXPORT(URL) extern const char kTraceScheme[];
+ COMPONENT_EXPORT(URL) extern const char kUrnScheme[];
  COMPONENT_EXPORT(URL) extern const char kWsScheme[];
  COMPONENT_EXPORT(URL) extern const char kWssScheme[];
- 
 --- a/url/url_util.cc
 +++ b/url/url_util.cc
 @@ -62,7 +62,7 @@ struct SchemeRegistry {

+ 0 - 10
patches/core/ungoogled-chromium/disable-crash-reporter.patch

@@ -31,13 +31,3 @@
    DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
    DCHECK(!simple_url_loader_);
  
---- a/third_party/breakpad/breakpad/src/client/linux/sender/google_crash_report_sender.cc
-+++ b/third_party/breakpad/breakpad/src/client/linux/sender/google_crash_report_sender.cc
-@@ -85,6 +85,7 @@ bool CheckForRequiredFlagsOrDie() {
- }
- 
- int main(int argc, char* argv[]) {
-+  return 0;
-   google::InitGoogleLogging(argv[0]);
-   google::ParseCommandLineFlags(&argc, &argv, true);
-   if (!CheckForRequiredFlagsOrDie()) {

+ 44 - 30
patches/core/ungoogled-chromium/disable-fonts-googleapis-references.patch

@@ -1,5 +1,49 @@
 # Disables references to fonts.googleapis.com
 
+--- a/chrome/browser/chromeos/child_accounts/time_limits/web_time_limit_error_page/resources/web_time_limit_error_page.html
++++ b/chrome/browser/chromeos/child_accounts/time_limits/web_time_limit_error_page/resources/web_time_limit_error_page.html
+@@ -5,7 +5,7 @@
+ <meta name="viewport"
+       content="initial-scale=1, minimum-scale=1,width=device-width">
+ <title>$i18n{blockPageTitle}</title>
+-<link href="https://fonts.googleapis.com/css?family=Google+Sans" rel="stylesheet">
++<link href="chrome://resources/css/roboto.css" rel="stylesheet">
+ <link rel="stylesheet" href="../../../../../../../components/security_interstitials/core/common/resources/interstitial_core.css">
+ <link rel="stylesheet" href="../../../../../supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.css">
+ </head>
+--- a/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
++++ b/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
+@@ -2,7 +2,7 @@
+  * Use of this source code is governed by a BSD-style license that can be
+  * found in the LICENSE file. */
+ 
+-@import url(https://fonts.googleapis.com/css?family=Roboto);
++@import url(chrome://resources/css/roboto.css);
+ 
+ body {
+     margin: 0 0 20px 0;
+--- a/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
++++ b/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
+@@ -2,7 +2,7 @@
+  * Use of this source code is governed by a BSD-style license that can be
+  * found in the LICENSE file. */
+ 
+-@import url(https://fonts.googleapis.com/css?family=Roboto);
++@import url(chrome://resources/css/roboto.css);
+ 
+ body {
+   margin: 0 0 20px 0;
+--- a/chrome/browser/supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.html
++++ b/chrome/browser/supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.html
+@@ -5,7 +5,7 @@
+ <meta name="viewport"
+     content="initial-scale=1, minimum-scale=1, width=device-width">
+ <title>$i18n{blockPageTitle}</title>
+-<link href="https://fonts.googleapis.com/css?family=Google+Sans" rel="stylesheet">
++<link href="chrome://resources/css/roboto.css" rel="stylesheet">
+ <link rel="stylesheet" href="../../../../../components/security_interstitials/core/common/resources/interstitial_core.css">
+ <link rel="stylesheet" href="supervised_user_block_interstitial.css">
+ <script src="../../../../../ui/webui/resources/js/cr.js"></script>
 --- a/components/dom_distiller/content/browser/dom_distiller_viewer_source.cc
 +++ b/components/dom_distiller/content/browser/dom_distiller_viewer_source.cc
 @@ -295,7 +295,7 @@ bool DomDistillerViewerSource::ShouldSer
@@ -33,25 +77,6 @@
    e.rel = 'stylesheet';
    e.type = 'text/css';
    document.head.appendChild(e);
---- a/third_party/catapult/third_party/polymer/components/font-roboto/roboto.html
-+++ b/third_party/catapult/third_party/polymer/components/font-roboto/roboto.html
-@@ -7,4 +7,4 @@ The complete set of contributors may be
- Code distributed by Google as part of the polymer project is also
- subject to an additional IP rights grant found at http://polymer.github.io/PATENTS.txt
- -->
--<link rel="stylesheet" type="text/css" href="https://fonts.googleapis.com/css?family=Roboto+Mono:400,700|Roboto:400,300,300italic,400italic,500,500italic,700,700italic" crossorigin="anonymous">
-+<link rel="stylesheet" href="chrome://resources/css/roboto.css">
---- a/third_party/catapult/tracing/third_party/gl-matrix/jsdoc-template/static/default.css
-+++ b/third_party/catapult/tracing/third_party/gl-matrix/jsdoc-template/static/default.css
-@@ -168,7 +168,7 @@ ul.inheritsList
- 
- /* Copied from styles.css generated by Github Pages */
- 
--@import url(https://fonts.googleapis.com/css?family=Lato:300italic,700italic,300,700);
-+@import url(chrome://resources/css/roboto.css);
- 
- body {
-   padding:50px;
 --- a/third_party/crashpad/crashpad/doc/support/crashpad_doxygen.css
 +++ b/third_party/crashpad/crashpad/doc/support/crashpad_doxygen.css
 @@ -12,8 +12,7 @@
@@ -64,17 +89,6 @@
  
  body,
  table,
---- a/third_party/flatbuffers/src/docs/header.html
-+++ b/third_party/flatbuffers/src/docs/header.html
-@@ -14,7 +14,7 @@ $treeview
- $search
- $mathjax
- <link href="$relpath^$stylesheet" rel="stylesheet" type="text/css" />
--<link href="https://fonts.googleapis.com/css?family=Roboto:300,400,400italic,500,500italic,700,700italic|Roboto+Mono:400,700" rel="stylesheet">
-+<link href="chrome://resources/css/roboto.css" rel="stylesheet">
- $extrastylesheet
- </head>
- <body>
 --- a/tools/md_browser/base.css
 +++ b/tools/md_browser/base.css
 @@ -16,8 +16,7 @@

+ 15 - 7
patches/core/ungoogled-chromium/disable-google-host-detection.patch

@@ -2,9 +2,9 @@
 
 --- a/chrome/common/google_url_loader_throttle.cc
 +++ b/chrome/common/google_url_loader_throttle.cc
-@@ -14,10 +14,6 @@
- #include "services/network/public/mojom/url_response_head.mojom.h"
- #include "services/network/public/mojom/x_frame_options.mojom.h"
+@@ -18,10 +18,6 @@
+ #include "ui/base/device_form_factor.h"
+ #endif
  
 -#if BUILDFLAG(ENABLE_EXTENSIONS)
 -#include "extensions/common/extension_urls.h"
@@ -13,7 +13,7 @@
  namespace {
  
  #if defined(OS_ANDROID)
-@@ -59,53 +55,6 @@ void GoogleURLLoaderThrottle::DetachFrom
+@@ -66,61 +62,6 @@ void GoogleURLLoaderThrottle::DetachFrom
  void GoogleURLLoaderThrottle::WillStartRequest(
      network::ResourceRequest* request,
      bool* defer) {
@@ -62,12 +62,20 @@
 -    }
 -    base::UmaHistogramBoolean("Android.DarkTheme.DarkSearchRequested",
 -                              night_mode_enabled_);
+-
+-    if (base::FeatureList::IsEnabled(features::kRequestDesktopSiteForTablets) &&
+-        ui::GetDeviceFormFactor() == ui::DEVICE_FORM_FACTOR_TABLET) {
+-      request->headers.SetHeader(kRequestDesktopDataHeader,
+-                                 is_tab_large_enough_ ? "1" : "0");
+-      base::UmaHistogramBoolean("Android.RequestDesktopSite.TabletEligible",
+-                                is_tab_large_enough_);
+-    }
 -  }
 -#endif
  }
  
  void GoogleURLLoaderThrottle::WillRedirectRequest(
-@@ -115,37 +64,6 @@ void GoogleURLLoaderThrottle::WillRedire
+@@ -130,37 +71,6 @@ void GoogleURLLoaderThrottle::WillRedire
      std::vector<std::string>* to_be_removed_headers,
      net::HttpRequestHeaders* modified_headers,
      net::HttpRequestHeaders* modified_cors_exempt_headers) {
@@ -105,7 +113,7 @@
  }
  
  #if BUILDFLAG(ENABLE_EXTENSIONS)
-@@ -153,22 +71,5 @@ void GoogleURLLoaderThrottle::WillProces
+@@ -168,22 +78,5 @@ void GoogleURLLoaderThrottle::WillProces
      const GURL& response_url,
      network::mojom::URLResponseHead* response_head,
      bool* defer) {
@@ -580,7 +588,7 @@
  }  // namespace variations
 --- a/net/base/url_util.cc
 +++ b/net/base/url_util.cc
-@@ -430,27 +430,6 @@ bool HasGoogleHost(const GURL& url) {
+@@ -431,27 +431,6 @@ bool HasGoogleHost(const GURL& url) {
  }
  
  bool IsGoogleHost(base::StringPiece host) {

+ 2 - 2
patches/core/ungoogled-chromium/disable-mei-preload.patch

@@ -7,7 +7,7 @@
 
 --- a/chrome/BUILD.gn
 +++ b/chrome/BUILD.gn
-@@ -314,7 +314,6 @@ if (!is_android && !is_mac) {
+@@ -316,7 +316,6 @@ if (!is_android && !is_mac) {
      }
  
      data_deps += [
@@ -15,7 +15,7 @@
        "//third_party/widevine/cdm",
      ]
    }
-@@ -1039,7 +1038,6 @@ if (is_win) {
+@@ -1045,7 +1044,6 @@ if (is_win) {
        ":keystone_registration_framework",
        ":swiftshader_library",
        ":widevine_cdm_library",

+ 2 - 2
patches/core/ungoogled-chromium/disable-signin.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/ui/chrome_pages.cc
 +++ b/chrome/browser/ui/chrome_pages.cc
-@@ -493,32 +493,6 @@ GURL GetOSSettingsUrl(const std::string&
+@@ -494,32 +494,6 @@ GURL GetOSSettingsUrl(const std::string&
  void ShowBrowserSignin(Browser* browser,
                         signin_metrics::AccessPoint access_point,
                         signin::ConsentLevel consent_level) {
@@ -18,7 +18,7 @@
 -
 -  profiles::BubbleViewMode bubble_view_mode;
 -  if (IdentityManagerFactory::GetForProfile(original_profile)
--          ->HasPrimaryAccount()) {
+-          ->HasPrimaryAccount(signin::ConsentLevel::kSync)) {
 -    bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH;
 -  } else {
 -    switch (consent_level) {

+ 2 - 2
patches/core/ungoogled-chromium/disable-webstore-urls.patch

@@ -146,7 +146,7 @@
    } else {
      url_stats_.other_url_count++;
    }
-@@ -842,20 +820,6 @@ void ExtensionDownloader::HandleManifest
+@@ -844,20 +822,6 @@ void ExtensionDownloader::HandleManifest
          update->info);
    }
  
@@ -167,7 +167,7 @@
    NotifyExtensionsDownloadStageChanged(
        no_updates, ExtensionDownloaderDelegate::Stage::FINISHED);
    NotifyExtensionsDownloadFailed(
-@@ -1404,11 +1368,7 @@ bool ExtensionDownloader::IterateFetchCr
+@@ -1409,11 +1373,7 @@ bool ExtensionDownloader::IterateFetchCr
    // fetch.
    switch (fetch->credentials) {
      case ExtensionFetch::CREDENTIALS_NONE:

+ 8 - 8
patches/core/ungoogled-chromium/fix-building-without-enabling-reporting.patch

@@ -1,6 +1,6 @@
 --- a/content/browser/BUILD.gn
 +++ b/content/browser/BUILD.gn
-@@ -1150,6 +1150,10 @@ source_set("browser") {
+@@ -1164,6 +1164,10 @@ source_set("browser") {
      "net/browser_online_state_observer.cc",
      "net/browser_online_state_observer.h",
      "net/cookie_store_factory.cc",
@@ -11,7 +11,7 @@
      "net/network_errors_listing_ui.cc",
      "net/network_errors_listing_ui.h",
      "net/network_quality_observer_impl.cc",
-@@ -2796,10 +2800,6 @@ source_set("browser") {
+@@ -2829,10 +2833,6 @@ source_set("browser") {
  
    if (enable_reporting) {
      sources += [
@@ -32,7 +32,7 @@
  #include "services/data_decoder/public/mojom/resource_snapshot_for_web_bundle.mojom-blink.h"
  #include "services/network/public/cpp/features.h"
  #include "services/network/public/mojom/content_security_policy.mojom-blink.h"
-@@ -551,7 +552,9 @@ void LocalFrame::Trace(Visitor* visitor)
+@@ -545,7 +546,9 @@ void LocalFrame::Trace(Visitor* visitor)
    visitor->Trace(raw_system_clipboard_);
    visitor->Trace(virtual_keyboard_overlay_changed_observers_);
    visitor->Trace(pause_handle_receivers_);
@@ -42,7 +42,7 @@
  #if defined(OS_MAC)
    visitor->Trace(text_input_host_);
  #endif
-@@ -2273,6 +2276,7 @@ const base::UnguessableToken& LocalFrame
+@@ -2261,6 +2264,7 @@ const base::UnguessableToken& LocalFrame
    return base::UnguessableToken::Null();
  }
  
@@ -50,7 +50,7 @@
  mojom::blink::ReportingServiceProxy* LocalFrame::GetReportingService() {
    if (!reporting_service_.is_bound()) {
      GetBrowserInterfaceBroker().GetInterface(
-@@ -2281,6 +2285,7 @@ mojom::blink::ReportingServiceProxy* Loc
+@@ -2269,6 +2273,7 @@ mojom::blink::ReportingServiceProxy* Loc
    }
    return reporting_service_.get();
  }
@@ -65,10 +65,10 @@
  #include "mojo/public/cpp/bindings/pending_receiver.h"
  #include "mojo/public/cpp/bindings/unique_receiver_set.h"
 +#include "net/net_buildflags.h"
+ #include "third_party/blink/public/common/frame/payment_request_token.h"
  #include "third_party/blink/public/common/frame/transient_allow_fullscreen.h"
  #include "third_party/blink/public/mojom/blob/blob_url_store.mojom-blink.h"
- #include "third_party/blink/public/mojom/frame/back_forward_cache_controller.mojom-blink.h"
-@@ -521,9 +522,9 @@ class CORE_EXPORT LocalFrame final
+@@ -527,9 +528,9 @@ class CORE_EXPORT LocalFrame final
    }
  
    SmoothScrollSequencer& GetSmoothScrollSequencer();
@@ -80,7 +80,7 @@
    // Returns the frame host ptr. The interface returned is backed by an
    // associated interface with the legacy Chrome IPC channel.
    mojom::blink::LocalFrameHost& GetLocalFrameHostRemote() const;
-@@ -903,9 +904,11 @@ class CORE_EXPORT LocalFrame final
+@@ -926,9 +927,11 @@ class CORE_EXPORT LocalFrame final
    // const methods.
    //
    // LocalFrame can be reused by multiple ExecutionContext.

+ 3 - 3
patches/core/ungoogled-chromium/fix-building-without-one-click-signin.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/ui/BUILD.gn
 +++ b/chrome/browser/ui/BUILD.gn
-@@ -4353,8 +4353,6 @@ static_library("ui") {
+@@ -4422,8 +4422,6 @@ static_library("ui") {
          "views/sync/dice_bubble_sync_promo_view.h",
          "views/sync/dice_signin_button_view.cc",
          "views/sync/dice_signin_button_view.h",
@@ -25,7 +25,7 @@
  }
 --- a/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
 +++ b/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
-@@ -371,6 +371,7 @@ void InlineSigninHelper::OnClientOAuthSu
+@@ -375,6 +375,7 @@ void InlineSigninHelper::OnClientOAuthSu
      const ClientOAuthResult& result,
      Profile* /*profile*/,
      Profile::CreateStatus /*status*/) {
@@ -33,7 +33,7 @@
    HandlerSigninReason reason = GetHandlerSigninReason(current_url_);
    if (reason == HandlerSigninReason::FETCH_LST_ONLY) {
      // Constants are only available on Windows for the Google Credential
-@@ -459,6 +460,7 @@ void InlineSigninHelper::OnClientOAuthSu
+@@ -465,6 +466,7 @@ void InlineSigninHelper::OnClientOAuthSu
      CreateSyncStarter(result.refresh_token);
    }
    base::ThreadTaskRunnerHandle::Get()->DeleteSoon(FROM_HERE, this);

+ 294 - 88
patches/core/ungoogled-chromium/fix-building-without-safebrowsing.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -4128,11 +4128,13 @@ ChromeContentBrowserClient::CreateThrott
+@@ -4106,11 +4106,13 @@ ChromeContentBrowserClient::CreateThrott
                     &throttles);
  #endif
  
@@ -16,8 +16,8 @@
  
  // TODO(crbug.com/1052397): Revisit the macro expression once build flag switch
  // of lacros-chrome is complete.
-@@ -5314,20 +5316,7 @@ ChromeContentBrowserClient::GetSafeBrows
-     bool should_check_on_sb_disabled) {
+@@ -5309,26 +5311,7 @@ ChromeContentBrowserClient::GetSafeBrows
+     const std::vector<std::string>& allowlist_domains) {
    DCHECK_CURRENTLY_ON(BrowserThread::IO);
  
 -  // Should not bypass safe browsing check if the check is for enterprise
@@ -33,12 +33,18 @@
 -            safe_browsing_service_->ui_manager());
 -  }
 -
+-  // Update allowlist domains.
+-  if (safe_browsing_url_checker_delegate_) {
+-    safe_browsing_url_checker_delegate_->SetPolicyAllowlistDomains(
+-        allowlist_domains);
+-  }
+-
 -  return safe_browsing_url_checker_delegate_;
 +  return nullptr;
  }
  
  safe_browsing::RealTimeUrlLookupServiceBase*
-@@ -5348,11 +5337,6 @@ ChromeContentBrowserClient::GetUrlLookup
+@@ -5349,11 +5332,6 @@ ChromeContentBrowserClient::GetUrlLookup
          GetForProfile(profile);
    }
  #endif
@@ -50,9 +56,57 @@
    return nullptr;
  }
  
+--- a/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
++++ b/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
+@@ -87,45 +87,6 @@ void MaybeCreateSafeBrowsingForRenderer(
+         const std::vector<std::string>& allowlist_domains)>
+         get_checker_delegate,
+     mojo::PendingReceiver<safe_browsing::mojom::SafeBrowsing> receiver) {
+-  DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
+-
+-  content::RenderProcessHost* render_process_host =
+-      content::RenderProcessHost::FromID(process_id);
+-  if (!render_process_host)
+-    return;
+-
+-  PrefService* pref_service =
+-      Profile::FromBrowserContext(render_process_host->GetBrowserContext())
+-          ->GetPrefs();
+-
+-  std::vector<std::string> allowlist_domains =
+-      safe_browsing::GetURLAllowlistByPolicy(pref_service);
+-
+-  // Log the size of the domains to make sure copying them is
+-  // not too expensive.
+-  if (allowlist_domains.size() > 0) {
+-    int total_size = 0;
+-    for (const auto& domains : allowlist_domains) {
+-      total_size += domains.size();
+-    }
+-    base::UmaHistogramCounts10000(
+-        "SafeBrowsing.Policy.AllowlistDomainsTotalSize", total_size);
+-  }
+-
+-  bool safe_browsing_enabled =
+-      safe_browsing::IsSafeBrowsingEnabled(*pref_service);
+-  content::GetIOThreadTaskRunner({})->PostTask(
+-      FROM_HERE,
+-      base::BindOnce(
+-          &safe_browsing::MojoSafeBrowsingImpl::MaybeCreate, process_id,
+-          resource_context,
+-          base::BindRepeating(get_checker_delegate, safe_browsing_enabled,
+-                              // Navigation initiated from renderer should never
+-                              // check when safe browsing is disabled, because
+-                              // enterprise check only supports mainframe URL.
+-                              /*should_check_on_sb_disabled=*/false,
+-                              allowlist_domains),
+-          std::move(receiver)));
+ }
+ 
+ }  // namespace
 --- a/chrome/browser/download/chrome_download_manager_delegate.cc
 +++ b/chrome/browser/download/chrome_download_manager_delegate.cc
-@@ -130,7 +130,6 @@ using content::DownloadManager;
+@@ -131,7 +131,6 @@ using content::DownloadManager;
  using download::DownloadItem;
  using download::DownloadPathReservationTracker;
  using download::PathValidationResult;
@@ -60,7 +114,7 @@
  using safe_browsing::DownloadProtectionService;
  
  namespace {
-@@ -1430,8 +1429,6 @@ void ChromeDownloadManagerDelegate::OnDo
+@@ -1431,8 +1430,6 @@ void ChromeDownloadManagerDelegate::OnDo
      if (item->GetOriginalMimeType() == "application/x-x509-user-cert")
        DownloadItemModel(item).SetShouldPreferOpeningInBrowser(true);
  #endif
@@ -69,8 +123,8 @@
    }
    if (ShouldBlockFile(target_info->danger_type, item)) {
      MaybeReportDangerousDownloadBlocked(
---- a/chrome/browser/enterprise/connectors/content_analysis_delegate.cc
-+++ b/chrome/browser/enterprise/connectors/content_analysis_delegate.cc
+--- a/chrome/browser/enterprise/connectors/analysis/content_analysis_delegate.cc
++++ b/chrome/browser/enterprise/connectors/analysis/content_analysis_delegate.cc
 @@ -37,13 +37,11 @@
  #include "chrome/browser/safe_browsing/cloud_content_scanning/binary_upload_service_factory.h"
  #include "chrome/browser/safe_browsing/cloud_content_scanning/deep_scanning_utils.h"
@@ -85,9 +139,83 @@
  #include "components/safe_browsing/core/features.h"
  #include "components/url_matcher/url_matcher.h"
  #include "content/public/browser/web_contents.h"
+--- a/chrome/browser/enterprise/connectors/connectors_service.cc
++++ b/chrome/browser/enterprise/connectors/connectors_service.cc
+@@ -265,19 +265,6 @@ base::Optional<std::string> ConnectorsSe
+   return base::nullopt;
+ }
+ 
+-safe_browsing::EnterpriseRealTimeUrlCheckMode
+-ConnectorsService::GetAppliedRealTimeUrlCheck() const {
+-  if (!ConnectorsEnabled() ||
+-      !GetDmToken(prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope)
+-           .has_value()) {
+-    return safe_browsing::REAL_TIME_CHECK_DISABLED;
+-  }
+-
+-  return static_cast<safe_browsing::EnterpriseRealTimeUrlCheckMode>(
+-      Profile::FromBrowserContext(context_)->GetPrefs()->GetInteger(
+-          prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode));
+-}
+-
+ ConnectorsManager* ConnectorsService::ConnectorsManagerForTesting() {
+   return connectors_manager_.get();
+ }
+--- a/chrome/browser/enterprise/connectors/connectors_service.h
++++ b/chrome/browser/enterprise/connectors/connectors_service.h
+@@ -13,7 +13,6 @@
+ #include "components/keyed_service/content/browser_context_keyed_service_factory.h"
+ #include "components/keyed_service/core/keyed_service.h"
+ #include "components/policy/core/common/policy_types.h"
+-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
+ #include "content/public/browser/browser_context.h"
+ 
+ namespace base {
+@@ -73,12 +72,6 @@ class ConnectorsService : public KeyedSe
+   // is no token to use.
+   base::Optional<std::string> GetDMTokenForRealTimeUrlCheck() const;
+ 
+-  // Returns the value to used by the enterprise real-time URL check Connector
+-  // if it is set and if the scope it's set at has a valid browser-profile
+-  // affiliation.
+-  safe_browsing::EnterpriseRealTimeUrlCheckMode GetAppliedRealTimeUrlCheck()
+-      const;
+-
+   // Testing functions.
+   ConnectorsManager* ConnectorsManagerForTesting();
+ 
+--- a/chrome/browser/extensions/api/enterprise_reporting_private/context_info_fetcher.cc
++++ b/chrome/browser/extensions/api/enterprise_reporting_private/context_info_fetcher.cc
+@@ -49,7 +49,6 @@ void ContextInfoFetcher::Fetch(ContextIn
+       GetAnalysisConnectorProviders(enterprise_connectors::FILE_DOWNLOADED);
+   info.on_bulk_data_entry_providers =
+       GetAnalysisConnectorProviders(enterprise_connectors::BULK_DATA_ENTRY);
+-  info.realtime_url_check_mode = GetRealtimeUrlCheckMode();
+   info.on_security_event_providers = GetOnSecurityEventProviders();
+   info.browser_version = version_info::GetVersionNumber();
+ 
+@@ -91,18 +90,6 @@ std::vector<std::string> ContextInfoFetc
+   return connectors_service_->GetAnalysisServiceProviderNames(connector);
+ }
+ 
+-api::enterprise_reporting_private::RealtimeUrlCheckMode
+-ContextInfoFetcher::GetRealtimeUrlCheckMode() {
+-  switch (connectors_service_->GetAppliedRealTimeUrlCheck()) {
+-    case safe_browsing::REAL_TIME_CHECK_DISABLED:
+-      return api::enterprise_reporting_private::
+-          REALTIME_URL_CHECK_MODE_DISABLED;
+-    case safe_browsing::REAL_TIME_CHECK_FOR_MAINFRAME_ENABLED:
+-      return api::enterprise_reporting_private::
+-          REALTIME_URL_CHECK_MODE_ENABLED_MAIN_FRAME;
+-  }
+-}
+-
+ std::vector<std::string> ContextInfoFetcher::GetOnSecurityEventProviders() {
+   return connectors_service_->GetReportingServiceProviderNames(
+       enterprise_connectors::ReportingConnector::SECURITY_EVENT);
 --- a/chrome/browser/extensions/api/safe_browsing_private/safe_browsing_private_event_router.cc
 +++ b/chrome/browser/extensions/api/safe_browsing_private/safe_browsing_private_event_router.cc
-@@ -300,6 +300,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -320,6 +320,7 @@ void SafeBrowsingPrivateEventRouter::OnD
      event_router_->BroadcastEvent(std::move(extension_event));
    }
  
@@ -95,15 +223,15 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
-@@ -334,6 +335,7 @@ void SafeBrowsingPrivateEventRouter::OnD
-           },
+@@ -356,6 +357,7 @@ void SafeBrowsingPrivateEventRouter::OnD
            params.url, params.file_name, params.download_digest_sha256,
-           params.user_name, mime_type, content_size));
+           params.user_name, mime_type, DangerTypeToThreatType(danger_type),
+           content_size));
 +#endif // FULL_SAFE_BROWSING
  }
  
  void SafeBrowsingPrivateEventRouter::OnSecurityInterstitialShown(
-@@ -361,6 +363,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -383,6 +385,7 @@ void SafeBrowsingPrivateEventRouter::OnS
      event_router_->BroadcastEvent(std::move(extension_event));
    }
  
@@ -111,7 +239,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyInterstitialEvent) == 0) {
-@@ -393,6 +396,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -415,6 +418,7 @@ void SafeBrowsingPrivateEventRouter::OnS
            },
            params.url, params.reason, net_error_code, params.user_name,
            event_result));
@@ -119,7 +247,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnSecurityInterstitialProceeded(
-@@ -420,6 +424,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -442,6 +446,7 @@ void SafeBrowsingPrivateEventRouter::OnS
      event_router_->BroadcastEvent(std::move(extension_event));
    }
  
@@ -127,7 +255,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyInterstitialEvent) == 0) {
-@@ -444,6 +449,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -466,6 +471,7 @@ void SafeBrowsingPrivateEventRouter::OnS
              return event;
            },
            params.url, params.reason, net_error_code, params.user_name));
@@ -135,7 +263,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnAnalysisConnectorResult(
-@@ -456,6 +462,7 @@ void SafeBrowsingPrivateEventRouter::OnA
+@@ -478,6 +484,7 @@ void SafeBrowsingPrivateEventRouter::OnA
      const enterprise_connectors::ContentAnalysisResponse::Result& result,
      const int64_t content_size,
      safe_browsing::EventResult event_result) {
@@ -143,7 +271,7 @@
    if (result.tag() == "malware") {
      DCHECK_EQ(1, result.triggered_rules().size());
      OnDangerousDeepScanningResult(
-@@ -467,6 +474,7 @@ void SafeBrowsingPrivateEventRouter::OnA
+@@ -489,6 +496,7 @@ void SafeBrowsingPrivateEventRouter::OnA
      OnSensitiveDataEvent(url, file_name, download_digest_sha256, mime_type,
                           trigger, result, content_size, event_result);
    }
@@ -151,7 +279,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnDangerousDeepScanningResult(
-@@ -481,6 +489,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -503,6 +511,7 @@ void SafeBrowsingPrivateEventRouter::OnD
      const std::string& malware_family,
      const std::string& malware_category,
      const std::string& evidence_locker_filepath) {
@@ -159,7 +287,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
-@@ -533,6 +542,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -555,6 +564,7 @@ void SafeBrowsingPrivateEventRouter::OnD
            url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
            threat_type, mime_type, trigger, content_size, event_result,
            malware_family, malware_category, evidence_locker_filepath));
@@ -167,7 +295,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnSensitiveDataEvent(
-@@ -544,6 +554,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -566,6 +576,7 @@ void SafeBrowsingPrivateEventRouter::OnS
      const enterprise_connectors::ContentAnalysisResponse::Result& result,
      const int64_t content_size,
      safe_browsing::EventResult event_result) {
@@ -175,7 +303,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeySensitiveDataEvent) == 0) {
-@@ -592,6 +603,7 @@ void SafeBrowsingPrivateEventRouter::OnS
+@@ -614,6 +625,7 @@ void SafeBrowsingPrivateEventRouter::OnS
            result, url.spec(), file_name, download_digest_sha256,
            GetProfileUserName(), mime_type, trigger, content_size,
            event_result));
@@ -183,7 +311,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnAnalysisConnectorWarningBypassed(
-@@ -603,6 +615,7 @@ void SafeBrowsingPrivateEventRouter::OnA
+@@ -625,6 +637,7 @@ void SafeBrowsingPrivateEventRouter::OnA
      safe_browsing::DeepScanAccessPoint access_point,
      const enterprise_connectors::ContentAnalysisResponse::Result& result,
      const int64_t content_size) {
@@ -191,7 +319,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeySensitiveDataEvent) == 0) {
-@@ -650,6 +663,7 @@ void SafeBrowsingPrivateEventRouter::OnA
+@@ -672,6 +685,7 @@ void SafeBrowsingPrivateEventRouter::OnA
            result, url.spec(), file_name, download_digest_sha256,
            GetProfileUserName(), mime_type, trigger, access_point,
            content_size));
@@ -199,7 +327,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnUnscannedFileEvent(
-@@ -662,6 +676,7 @@ void SafeBrowsingPrivateEventRouter::OnU
+@@ -684,6 +698,7 @@ void SafeBrowsingPrivateEventRouter::OnU
      const std::string& reason,
      const int64_t content_size,
      safe_browsing::EventResult event_result) {
@@ -207,7 +335,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyUnscannedFileEvent) == 0) {
-@@ -704,6 +719,7 @@ void SafeBrowsingPrivateEventRouter::OnU
+@@ -726,6 +741,7 @@ void SafeBrowsingPrivateEventRouter::OnU
            url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
            mime_type, trigger, access_point, reason, content_size,
            event_result));
@@ -215,7 +343,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnDangerousDownloadEvent(
-@@ -714,6 +730,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -749,6 +765,7 @@ void SafeBrowsingPrivateEventRouter::OnD
      const std::string& mime_type,
      const int64_t content_size,
      safe_browsing::EventResult event_result) {
@@ -223,7 +351,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
-@@ -751,6 +768,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -786,6 +803,7 @@ void SafeBrowsingPrivateEventRouter::OnD
            },
            url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
            threat_type, mime_type, content_size, event_result));
@@ -231,7 +359,7 @@
  }
  
  void SafeBrowsingPrivateEventRouter::OnDangerousDownloadWarningBypassed(
-@@ -760,6 +778,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -807,6 +825,7 @@ void SafeBrowsingPrivateEventRouter::OnD
      const std::string& threat_type,
      const std::string& mime_type,
      const int64_t content_size) {
@@ -239,7 +367,7 @@
    auto settings = GetReportingSettings();
    if (!settings.has_value() ||
        settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
-@@ -796,6 +815,7 @@ void SafeBrowsingPrivateEventRouter::OnD
+@@ -843,6 +862,7 @@ void SafeBrowsingPrivateEventRouter::OnD
            },
            url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
            threat_type, mime_type, content_size));
@@ -247,7 +375,7 @@
  }
  
  // static
-@@ -1097,7 +1117,11 @@ void SafeBrowsingPrivateEventRouter::Rep
+@@ -1115,7 +1135,11 @@ void SafeBrowsingPrivateEventRouter::Rep
  }
  
  std::string SafeBrowsingPrivateEventRouter::GetProfileUserName() const {
@@ -261,7 +389,7 @@
  #if BUILDFLAG(IS_CHROMEOS_ASH)
 --- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
 +++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
-@@ -20,7 +20,6 @@
+@@ -25,7 +25,6 @@
  #include "chrome/browser/file_system_access/file_system_access_permission_context_factory.h"
  #include "chrome/browser/file_system_access/file_system_access_permission_request_manager.h"
  #include "chrome/browser/profiles/profile.h"
@@ -269,7 +397,7 @@
  #include "chrome/browser/ui/file_system_access_dialogs.h"
  #include "chrome/common/chrome_paths.h"
  #include "components/content_settings/core/browser/host_content_settings_map.h"
-@@ -232,79 +231,6 @@ BindResultCallbackToCurrentSequence(
+@@ -278,79 +277,6 @@ BindResultCallbackToCurrentSequence(
        base::SequencedTaskRunnerHandle::Get(), std::move(callback));
  }
  
@@ -346,10 +474,10 @@
 -  return ChromeFileSystemAccessPermissionContext::AfterWriteCheckResult::kBlock;
 -}
 -
- }  // namespace
- 
- ChromeFileSystemAccessPermissionContext::Grants::Grants() = default;
-@@ -380,28 +306,6 @@ void ChromeFileSystemAccessPermissionCon
+ std::string GenerateLastPickedDirectoryKey(const std::string& id) {
+   return id.empty() ? kDefaultLastPickedDirectoryKey
+                     : base::StrCat({kCustomLastPickedDirectoryKey, "-", id});
+@@ -825,28 +751,6 @@ void ChromeFileSystemAccessPermissionCon
                       std::move(callback)));
  }
  
@@ -380,7 +508,7 @@
          const url::Origin& origin,
 --- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
 +++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
-@@ -53,10 +53,6 @@ class ChromeFileSystemAccessPermissionCo
+@@ -63,10 +63,6 @@ class ChromeFileSystemAccessPermissionCo
        HandleType handle_type,
        content::GlobalFrameRoutingId frame_id,
        base::OnceCallback<void(SensitiveDirectoryResult)> callback) override;
@@ -393,7 +521,7 @@
  
 --- a/chrome/browser/media/webrtc/display_media_access_handler.cc
 +++ b/chrome/browser/media/webrtc/display_media_access_handler.cc
-@@ -109,6 +109,7 @@ void DisplayMediaAccessHandler::HandleRe
+@@ -107,6 +107,7 @@ void DisplayMediaAccessHandler::HandleRe
      return;
    }
  
@@ -401,7 +529,7 @@
    // SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
    // warnings until user interaction. If the current page has a delayed warning,
    // it'll have a user interaction observer attached. Show the warning
-@@ -123,6 +124,7 @@ void DisplayMediaAccessHandler::HandleRe
+@@ -121,6 +122,7 @@ void DisplayMediaAccessHandler::HandleRe
      observer->OnDesktopCaptureRequest();
      return;
    }
@@ -432,7 +560,7 @@
  
  #if defined(OS_ANDROID)
  #include "base/feature_list.h"
-@@ -829,6 +828,7 @@ autofill::LanguageCode ChromePasswordMan
+@@ -793,6 +792,7 @@ autofill::LanguageCode ChromePasswordMan
    return autofill::LanguageCode();
  }
  
@@ -440,7 +568,7 @@
  safe_browsing::PasswordProtectionService*
  ChromePasswordManagerClient::GetPasswordProtectionService() const {
    return safe_browsing::ChromePasswordProtectionService::
-@@ -839,13 +839,6 @@ ChromePasswordManagerClient::GetPassword
+@@ -803,13 +803,6 @@ ChromePasswordManagerClient::GetPassword
  void ChromePasswordManagerClient::CheckSafeBrowsingReputation(
      const GURL& form_action,
      const GURL& frame_url) {
@@ -454,7 +582,7 @@
  }
  #endif  // defined(ON_FOCUS_PING_ENABLED)
  
-@@ -855,22 +848,10 @@ void ChromePasswordManagerClient::CheckP
+@@ -819,22 +812,10 @@ void ChromePasswordManagerClient::CheckP
      const std::vector<password_manager::MatchingReusedCredential>&
          matching_reused_credentials,
      bool password_field_exists) {
@@ -478,21 +606,20 @@
  }
  
  ukm::SourceId ChromePasswordManagerClient::GetUkmSourceId() {
-@@ -1364,10 +1345,12 @@ void ChromePasswordManagerClient::OnPast
+@@ -1286,9 +1267,11 @@ void ChromePasswordManagerClient::OnPast
+   }
  
-   if (self) {
-     was_on_paste_called_ = true;
+   was_on_paste_called_ = true;
 +#if defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
-     password_reuse_detection_manager_.OnPaste(std::move(text));
+   password_reuse_detection_manager_.OnPaste(std::move(text));
 +#endif // defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
-   }
  }
 -#endif
 +#endif //  !defined(OS_ANDROID)
  
  void ChromePasswordManagerClient::RenderFrameCreated(
      content::RenderFrameHost* render_frame_host) {
-@@ -1424,7 +1407,9 @@ void ChromePasswordManagerClient::OnInpu
+@@ -1323,7 +1306,9 @@ void ChromePasswordManagerClient::OnInpu
    if (key_event.windows_key_code == (ui::VKEY_V & 0x1f)) {
      OnPaste();
    } else {
@@ -502,7 +629,7 @@
    }
  #endif  // defined(OS_ANDROID)
  }
-@@ -1463,6 +1448,7 @@ bool ChromePasswordManagerClient::IsPass
+@@ -1362,6 +1347,7 @@ bool ChromePasswordManagerClient::IsPass
      is_enabled = false;
    }
  
@@ -510,7 +637,7 @@
    // SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
    // warnings until user interaction. If the current page has a delayed warning,
    // it'll have a user interaction observer attached. Disable password
-@@ -1473,6 +1459,7 @@ bool ChromePasswordManagerClient::IsPass
+@@ -1372,6 +1358,7 @@ bool ChromePasswordManagerClient::IsPass
      observer->OnPasswordSaveOrAutofillDenied();
      is_enabled = false;
    }
@@ -520,7 +647,7 @@
      password_manager::BrowserSavePasswordProgressLogger logger(
 --- a/chrome/browser/password_manager/chrome_password_manager_client.h
 +++ b/chrome/browser/password_manager/chrome_password_manager_client.h
-@@ -190,13 +190,14 @@ class ChromePasswordManagerClient
+@@ -189,13 +189,14 @@ class ChromePasswordManagerClient
    void AnnotateNavigationEntry(bool has_password_field) override;
    autofill::LanguageCode GetPageLanguage() const override;
  
@@ -536,7 +663,7 @@
  
    void CheckProtectedPasswordEntry(
        password_manager::metrics_util::PasswordType reused_password_type,
-@@ -204,6 +205,7 @@ class ChromePasswordManagerClient
+@@ -203,6 +204,7 @@ class ChromePasswordManagerClient
        const std::vector<password_manager::MatchingReusedCredential>&
            matching_reused_credentials,
        bool password_field_exists) override;
@@ -546,7 +673,7 @@
  
 --- a/chrome/browser/permissions/abusive_origin_permission_revocation_request.cc
 +++ b/chrome/browser/permissions/abusive_origin_permission_revocation_request.cc
-@@ -17,7 +17,6 @@
+@@ -16,7 +16,6 @@
  #include "components/permissions/permission_uma_util.h"
  #include "components/permissions/permissions_client.h"
  #include "components/prefs/pref_service.h"
@@ -554,7 +681,7 @@
  #include "components/safe_browsing/core/db/database_manager.h"
  
  namespace {
-@@ -113,6 +112,7 @@ void AbusiveOriginPermissionRevocationRe
+@@ -136,6 +135,7 @@ void AbusiveOriginPermissionRevocationRe
    DCHECK(profile_);
    DCHECK(callback_);
  
@@ -562,18 +689,18 @@
    if (!AbusiveOriginNotificationsPermissionRevocationConfig::IsEnabled() ||
        !safe_browsing::IsSafeBrowsingEnabled(*profile_->GetPrefs()) ||
        IsOriginExemptedFromFutureRevocations(profile_, origin_)) {
-@@ -145,6 +145,7 @@ void AbusiveOriginPermissionRevocationRe
-       return;
+@@ -182,6 +182,7 @@ void AbusiveOriginPermissionRevocationRe
      }
    }
+   NotifyCallback(Outcome::PERMISSION_NOT_REVOKED);
 +#endif // BUILDFLAG(FULL_SAFE_BROWSING)
- 
-   std::move(callback_).Run(Outcome::PERMISSION_NOT_REVOKED);
  }
+ 
+ void AbusiveOriginPermissionRevocationRequest::OnSafeBrowsingVerdictReceived(
 --- a/chrome/browser/permissions/contextual_notification_permission_ui_selector.cc
 +++ b/chrome/browser/permissions/contextual_notification_permission_ui_selector.cc
-@@ -18,10 +18,8 @@
- #include "chrome/browser/permissions/crowd_deny_preload_data.h"
+@@ -17,10 +17,8 @@
+ #include "chrome/browser/browser_process.h"
  #include "chrome/browser/permissions/quiet_notification_permission_ui_config.h"
  #include "chrome/browser/permissions/quiet_notification_permission_ui_state.h"
 -#include "chrome/browser/safe_browsing/safe_browsing_service.h"
@@ -583,7 +710,7 @@
  
  namespace {
  
-@@ -151,9 +149,6 @@ void ContextualNotificationPermissionUiS
+@@ -150,9 +148,6 @@ void ContextualNotificationPermissionUiS
  }
  
  void ContextualNotificationPermissionUiSelector::Cancel() {
@@ -593,9 +720,9 @@
  }
  
  ContextualNotificationPermissionUiSelector::
-@@ -164,24 +159,14 @@ void ContextualNotificationPermissionUiS
-   base::Optional<Decision> decision = GetDecisionBasedOnSiteReputation(
-       CrowdDenyPreloadData::GetInstance()->GetReputationDataForSite(origin));
+@@ -173,24 +168,14 @@ void ContextualNotificationPermissionUiS
+   base::Optional<Decision> decision =
+       GetDecisionBasedOnSiteReputation(reputation);
  
 -  // If the PreloadData suggests this is an unacceptable site, ping Safe
 -  // Browsing to verify; but do not ping if it is not warranted.
@@ -625,7 +752,7 @@
  void ContextualNotificationPermissionUiSelector::OnSafeBrowsingVerdictReceived(
 --- a/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
 +++ b/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
-@@ -18,7 +18,6 @@
+@@ -19,7 +19,6 @@
  #include "components/permissions/prediction_service/prediction_service.h"
  #include "components/permissions/prediction_service/prediction_service_messages.pb.h"
  #include "components/prefs/pref_service.h"
@@ -633,14 +760,16 @@
  
  namespace {
  
-@@ -203,6 +202,5 @@ bool PredictionBasedPermissionUiSelector
+@@ -182,8 +181,7 @@ bool PredictionBasedPermissionUiSelector
    // We need to also check `kQuietNotificationPrompts` here since there is no
    // generic safeguard anywhere else in the stack.
    return base::FeatureList::IsEnabled(features::kQuietNotificationPrompts) &&
 -         base::FeatureList::IsEnabled(features::kPermissionPredictions) &&
--         safe_browsing::IsEnhancedProtectionEnabled(*(profile_->GetPrefs()));
+-         safe_browsing::IsSafeBrowsingEnabled(*(profile_->GetPrefs()));
 +         base::FeatureList::IsEnabled(features::kPermissionPredictions);
  }
+ 
+ // static
 --- a/chrome/browser/reputation/reputation_service.cc
 +++ b/chrome/browser/reputation/reputation_service.cc
 @@ -119,9 +119,7 @@ void ReputationService::GetReputationSta
@@ -654,6 +783,47 @@
  
    LookalikeUrlService* service = LookalikeUrlService::Get(profile_);
    if (service->EngagedSitesNeedUpdating()) {
+--- a/chrome/browser/safe_browsing/safe_browsing_metrics_collector.cc
++++ b/chrome/browser/safe_browsing/safe_browsing_metrics_collector.cc
+@@ -11,10 +11,11 @@
+ #include "base/util/values/values_util.h"
+ #include "components/prefs/pref_service.h"
+ #include "components/prefs/scoped_user_pref_update.h"
+-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
++#include "components/safe_browsing/buildflags.h"
+ 
+ namespace {
+ 
++#if BUILDFLAG(FULL_SAFE_BROWSING)
+ using EventType = safe_browsing::SafeBrowsingMetricsCollector::EventType;
+ using UserState = safe_browsing::SafeBrowsingMetricsCollector::UserState;
+ using SafeBrowsingState = safe_browsing::SafeBrowsingState;
+@@ -349,4 +350,5 @@ std::string SafeBrowsingMetricsCollector
+ SafeBrowsingMetricsCollector::Event::Event(EventType type, base::Time timestamp)
+     : type(type), timestamp(timestamp) {}
+ 
++#endif
+ }  // namespace safe_browsing
+--- a/chrome/browser/safe_browsing/safe_browsing_metrics_collector_factory.cc
++++ b/chrome/browser/safe_browsing/safe_browsing_metrics_collector_factory.cc
+@@ -8,9 +8,11 @@
+ #include "chrome/browser/profiles/profile.h"
+ #include "chrome/browser/safe_browsing/safe_browsing_metrics_collector.h"
+ #include "components/keyed_service/content/browser_context_dependency_manager.h"
++#include "components/safe_browsing/buildflags.h"
+ #include "content/public/browser/browser_context.h"
+ 
+ namespace safe_browsing {
++#if BUILDFLAG(FULL_SAFE_BROWSING)
+ 
+ // static
+ SafeBrowsingMetricsCollector*
+@@ -36,4 +38,5 @@ KeyedService* SafeBrowsingMetricsCollect
+   return new SafeBrowsingMetricsCollector(profile->GetPrefs());
+ }
+ 
++#endif // BUILDFLAG(FULL_SAFE_BROWSING)
+ }  // namespace safe_browsing
 --- a/chrome/browser/safe_browsing/url_lookup_service_factory.cc
 +++ b/chrome/browser/safe_browsing/url_lookup_service_factory.cc
 @@ -53,37 +53,7 @@ RealTimeUrlLookupServiceFactory::RealTim
@@ -778,7 +948,7 @@
  }
 --- a/chrome/browser/ui/views/download/download_item_view.cc
 +++ b/chrome/browser/ui/views/download/download_item_view.cc
-@@ -770,9 +770,7 @@ void DownloadItemView::UpdateLabels() {
+@@ -774,9 +774,7 @@ void DownloadItemView::UpdateLabels() {
  
    deep_scanning_label_->SetVisible(mode_ == Mode::kDeepScanning);
    if (deep_scanning_label_->GetVisible()) {
@@ -789,7 +959,7 @@
                         ? IDS_PROMPT_DEEP_SCANNING_DOWNLOAD
                         : IDS_PROMPT_DEEP_SCANNING_APP_DOWNLOAD;
      const base::string16 filename = ElidedFilename(*deep_scanning_label_);
-@@ -796,11 +794,15 @@ void DownloadItemView::UpdateButtons() {
+@@ -800,11 +798,15 @@ void DownloadItemView::UpdateButtons() {
    }
  
    const bool allow_open_during_deep_scan =
@@ -805,7 +975,7 @@
    open_button_->SetEnabled((mode_ == Mode::kNormal) || prompt_to_scan ||
                             allow_open_during_deep_scan);
  
-@@ -1224,7 +1226,9 @@ void DownloadItemView::ShowContextMenuIm
+@@ -1233,7 +1235,9 @@ void DownloadItemView::ShowContextMenuIm
  }
  
  void DownloadItemView::OpenDownloadDuringAsyncScanning() {
@@ -817,7 +987,7 @@
  
 --- a/chrome/browser/ui/views/safe_browsing/password_reuse_modal_warning_dialog.cc
 +++ b/chrome/browser/ui/views/safe_browsing/password_reuse_modal_warning_dialog.cc
-@@ -172,10 +172,7 @@ PasswordReuseModalWarningDialog::Passwor
+@@ -174,10 +174,7 @@ PasswordReuseModalWarningDialog::Passwor
          placeholder_offsets);
    } else {
      views::Label* message_body_label = CreateMessageBodyLabel(
@@ -831,7 +1001,7 @@
    modal_construction_start_time_ = base::TimeTicks::Now();
 --- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
 +++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
-@@ -86,8 +86,6 @@
+@@ -76,8 +76,6 @@
  #include "components/prefs/pref_service.h"
  #include "components/reading_list/features/reading_list_switches.h"
  #include "components/safe_browsing/buildflags.h"
@@ -840,7 +1010,7 @@
  #include "components/search/ntp_features.h"
  #include "components/security_interstitials/content/connection_help_ui.h"
  #include "components/security_interstitials/content/known_interception_disclosure_ui.h"
-@@ -557,8 +555,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
+@@ -570,8 +568,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
      return &NewWebUI<PredictorsUI>;
    if (url.host_piece() == chrome::kChromeUIQuotaInternalsHost)
      return &NewWebUI<QuotaInternalsUI>;
@@ -861,7 +1031,7 @@
  
 --- a/chrome/browser/ui/webui/management/management_ui_handler.cc
 +++ b/chrome/browser/ui/webui/management/management_ui_handler.cc
-@@ -814,14 +814,6 @@ base::Value ManagementUIHandler::GetThre
+@@ -798,14 +798,6 @@ base::Value ManagementUIHandler::GetThre
  
    auto* on_page_visited_event =
        chrome_policies.GetValue(policy::key::kEnterpriseRealTimeUrlCheckMode);
@@ -1020,9 +1190,45 @@
  
    // The latest config we've committed. Starts out null.
    // Protected by lock_.
---- a/content/browser/file_system_access/native_file_system_file_writer_impl.cc
-+++ b/content/browser/file_system_access/native_file_system_file_writer_impl.cc
-@@ -513,15 +513,8 @@ void NativeFileSystemFileWriterImpl::Clo
+--- a/components/safe_browsing/core/password_protection/password_protection_service_base.cc
++++ b/components/safe_browsing/core/password_protection/password_protection_service_base.cc
+@@ -249,12 +249,6 @@ void PasswordProtectionServiceBase::Hist
+   history_service_observation_.Reset();
+ }
+ 
+-bool PasswordProtectionServiceBase::IsWarningEnabled(
+-    ReusedPasswordAccountType password_type) {
+-  return GetPasswordProtectionWarningTriggerPref(password_type) ==
+-         PHISHING_REUSE;
+-}
+-
+ // static
+ ReusedPasswordType
+ PasswordProtectionServiceBase::GetPasswordProtectionReusedPasswordType(
+--- a/components/safe_browsing/core/password_protection/password_protection_service_base.h
++++ b/components/safe_browsing/core/password_protection/password_protection_service_base.h
+@@ -22,7 +22,6 @@
+ #include "components/password_manager/core/browser/password_reuse_detector.h"
+ #include "components/safe_browsing/buildflags.h"
+ #include "components/safe_browsing/core/browser/referrer_chain_provider.h"
+-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
+ #include "components/safe_browsing/core/db/database_manager.h"
+ #include "components/safe_browsing/core/db/v4_protocol_manager_util.h"
+ #include "components/safe_browsing/core/password_protection/metrics_util.h"
+@@ -130,10 +129,6 @@ class PasswordProtectionServiceBase : pu
+   // Returns if the warning UI is enabled.
+   bool IsWarningEnabled(ReusedPasswordAccountType password_type);
+ 
+-  // Returns the pref value of password protection warning trigger.
+-  virtual PasswordProtectionTrigger GetPasswordProtectionWarningTriggerPref(
+-      ReusedPasswordAccountType password_type) const = 0;
+-
+   // If |url| matches Safe Browsing allowlist domains, password protection
+   // change password URL, or password protection login URLs in the enterprise
+   // policy.
+--- a/content/browser/file_system_access/file_system_access_file_writer_impl.cc
++++ b/content/browser/file_system_access/file_system_access_file_writer_impl.cc
+@@ -340,15 +340,8 @@ void FileSystemAccessFileWriterImpl::Clo
  
    close_callback_ = std::move(callback);
  
@@ -1033,19 +1239,19 @@
 -  }
 -
 -  ComputeHashForSwapFile(
--      base::BindOnce(&NativeFileSystemFileWriterImpl::DoAfterWriteCheck,
+-      base::BindOnce(&FileSystemAccessFileWriterImpl::DoAfterWriteCheck,
 -                     weak_factory_.GetWeakPtr()));
 +  DidAfterWriteCheck(
 +      FileSystemAccessPermissionContext::AfterWriteCheckResult::kAllow);
  }
  
- void NativeFileSystemFileWriterImpl::AbortImpl(AbortCallback callback) {
-@@ -541,37 +534,6 @@ void NativeFileSystemFileWriterImpl::Abo
+ void FileSystemAccessFileWriterImpl::AbortImpl(AbortCallback callback) {
+@@ -368,37 +361,6 @@ void FileSystemAccessFileWriterImpl::Abo
    manager()->RemoveFileWriter(this);
  }
  
 -// static
--void NativeFileSystemFileWriterImpl::DoAfterWriteCheck(
+-void FileSystemAccessFileWriterImpl::DoAfterWriteCheck(
 -    base::File::Error hash_result,
 -    const std::string& hash,
 -    int64_t size) {
@@ -1056,7 +1262,7 @@
 -    // callback.
 -    manager()->operation_runner().PostTaskWithThisObject(
 -        FROM_HERE, base::BindOnce(&RemoveSwapFile, swap_url()));
--    CallCloseCallbackAndDeleteThis(native_file_system_error::FromStatus(
+-    CallCloseCallbackAndDeleteThis(file_system_access_error::FromStatus(
 -        FileSystemAccessStatus::kOperationAborted,
 -        "Failed to perform Safe Browsing check."));
 -    return;
@@ -1071,16 +1277,16 @@
 -  item->has_user_gesture = has_transient_user_activation_;
 -  manager()->permission_context()->PerformAfterWriteChecks(
 -      std::move(item), context().frame_id,
--      base::BindOnce(&NativeFileSystemFileWriterImpl::DidAfterWriteCheck,
+-      base::BindOnce(&FileSystemAccessFileWriterImpl::DidAfterWriteCheck,
 -                     weak_factory_.GetWeakPtr()));
 -}
 -
- void NativeFileSystemFileWriterImpl::DidAfterWriteCheck(
+ void FileSystemAccessFileWriterImpl::DidAfterWriteCheck(
      FileSystemAccessPermissionContext::AfterWriteCheckResult result) {
    DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
---- a/content/browser/file_system_access/native_file_system_file_writer_impl.h
-+++ b/content/browser/file_system_access/native_file_system_file_writer_impl.h
-@@ -106,9 +106,6 @@ class CONTENT_EXPORT NativeFileSystemFil
+--- a/content/browser/file_system_access/file_system_access_file_writer_impl.h
++++ b/content/browser/file_system_access/file_system_access_file_writer_impl.h
+@@ -100,9 +100,6 @@ class CONTENT_EXPORT FileSystemAccessFil
    void TruncateImpl(uint64_t length, TruncateCallback callback);
    void CloseImpl(CloseCallback callback);
    void AbortImpl(AbortCallback callback);

+ 0 - 12
patches/core/ungoogled-chromium/remove-enable-dse-memoryssa-cflag.patch

@@ -1,12 +0,0 @@
---- a/build/config/compiler/BUILD.gn
-+++ b/build/config/compiler/BUILD.gn
-@@ -651,9 +651,6 @@ config("compiler") {
-         "-Wl,--thinlto-cache-policy,$cache_policy",
-       ]
- 
--      # TODO(https://crbug.com/1127713): Investigate, remove.
--      ldflags += [ "-Wl,-mllvm,-enable-dse-memoryssa=false" ]
--
-       ldflags += [ "-Wl,--lto-O" + lto_opt_level ]
-       if (thin_lto_enable_optimizations) {
-         # TODO(gbiv): We ideally shouldn't need to specify this; ThinLTO

File diff suppressed because it is too large
+ 160 - 165
patches/core/ungoogled-chromium/remove-unused-preferences-fields.patch


+ 1 - 1
patches/core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch

@@ -9,7 +9,7 @@
 -      "favicon_url": "https://www.google.com/images/branding/product/ico/googleg_lodp.ico",
 -      "search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:iOSSearchLanguage}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
 -      "suggest_url": "{google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:omniboxFocusType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}",
--      "image_url": "{google:baseURL}searchbyimage/upload",
+-      "image_url": "{google:baseSearchByImageURL}upload",
 -      "contextual_search_url": "{google:baseURL}_/contextualsearch?{google:contextualSearchVersion}{google:contextualSearchContextData}",
 -      "image_url_post_params": "encoded_image={google:imageThumbnail},image_url={google:imageURL},sbisrc={google:imageSearchSource},original_width={google:imageOriginalWidth},original_height={google:imageOriginalHeight}",
 -      "alternate_urls": [

+ 4 - 4
patches/core/ungoogled-chromium/toggle-translation-via-switch.patch

@@ -1,7 +1,7 @@
 # Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
 --- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
 +++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
-@@ -122,6 +122,7 @@
+@@ -123,6 +123,7 @@
  #include "components/spellcheck/common/spellcheck_common.h"
  #include "components/spellcheck/spellcheck_buildflags.h"
  #include "components/strings/grit/components_strings.h"
@@ -9,7 +9,7 @@
  #include "components/translate/core/browser/translate_download_manager.h"
  #include "components/translate/core/browser/translate_manager.h"
  #include "components/translate/core/browser/translate_prefs.h"
-@@ -1553,6 +1554,8 @@ void RenderViewContextMenu::AppendPageIt
+@@ -1573,6 +1574,8 @@ void RenderViewContextMenu::AppendPageIt
      menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
    }
  
@@ -18,7 +18,7 @@
    ChromeTranslateClient* chrome_translate_client =
        ChromeTranslateClient::FromWebContents(embedder_web_contents_);
    const bool canTranslate =
-@@ -1574,6 +1577,7 @@ void RenderViewContextMenu::AppendPageIt
+@@ -1594,6 +1597,7 @@ void RenderViewContextMenu::AppendPageIt
          IDC_CONTENT_CONTEXT_TRANSLATE,
          l10n_util::GetStringFUTF16(IDS_CONTENT_CONTEXT_TRANSLATE, language));
    }
@@ -56,7 +56,7 @@
      request_pending_ = true;
 --- a/components/translate/core/browser/translate_manager.cc
 +++ b/components/translate/core/browser/translate_manager.cc
-@@ -855,8 +855,9 @@ void TranslateManager::FilterIsTranslate
+@@ -889,8 +889,9 @@ void TranslateManager::FilterIsTranslate
          ->LogAutofillAssistantDeferredTriggerDecision();
    }
  

+ 1 - 1
patches/core/ungoogled-chromium/use-local-devtools-files.patch

@@ -5,7 +5,7 @@
 
 --- a/third_party/devtools-frontend/src/BUILD.gn
 +++ b/third_party/devtools-frontend/src/BUILD.gn
-@@ -212,7 +212,7 @@ devtools_applications = [
+@@ -230,7 +230,7 @@ devtools_applications = [
  devtools_frontend_resources_deps = [
    ":build_release_devtools",
    "front_end",

+ 27 - 27
patches/extra/bromite/fingerprinting-flags-client-rects-and-measuretext.patch

@@ -9,7 +9,7 @@
 
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -2352,6 +2352,7 @@ static_library("browser") {
+@@ -2362,6 +2362,7 @@ static_library("browser") {
      "//third_party/libyuv",
      "//third_party/metrics_proto",
      "//third_party/re2",
@@ -19,7 +19,7 @@
      "//third_party/widevine/cdm:headers",
 --- a/chrome/browser/about_flags.cc
 +++ b/chrome/browser/about_flags.cc
-@@ -177,6 +177,7 @@
+@@ -179,6 +179,7 @@
  #include "third_party/blink/public/common/forcedark/forcedark_switches.h"
  #include "third_party/blink/public/common/switches.h"
  #include "third_party/leveldatabase/leveldb_features.h"
@@ -44,7 +44,7 @@
  #endif  // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
 --- a/content/browser/BUILD.gn
 +++ b/content/browser/BUILD.gn
-@@ -218,6 +218,7 @@ source_set("browser") {
+@@ -217,6 +217,7 @@ source_set("browser") {
      "//third_party/libyuv",
      "//third_party/re2",
      "//third_party/sqlite",
@@ -54,7 +54,7 @@
      "//third_party/zlib",
 --- a/content/browser/renderer_host/render_process_host_impl.cc
 +++ b/content/browser/renderer_host/render_process_host_impl.cc
-@@ -214,6 +214,7 @@
+@@ -212,6 +212,7 @@
  #include "third_party/blink/public/common/user_agent/user_agent_metadata.h"
  #include "third_party/blink/public/mojom/disk_allocator.mojom.h"
  #include "third_party/blink/public/public_buildflags.h"
@@ -62,7 +62,7 @@
  #include "third_party/skia/include/core/SkBitmap.h"
  #include "ui/accessibility/accessibility_switches.h"
  #include "ui/base/ui_base_switches.h"
-@@ -3235,6 +3236,8 @@ void RenderProcessHostImpl::PropagateBro
+@@ -3299,6 +3300,8 @@ void RenderProcessHostImpl::PropagateBro
      switches::kEnableWebGLDraftExtensions,
      switches::kEnableWebGLImageChromium,
      switches::kFileUrlPathAlias,
@@ -73,7 +73,7 @@
      switches::kForceGpuMemAvailableMb,
 --- a/content/child/BUILD.gn
 +++ b/content/child/BUILD.gn
-@@ -103,6 +103,7 @@ target(link_target_type, "child") {
+@@ -104,6 +104,7 @@ target(link_target_type, "child") {
      "//third_party/blink/public/common",
      "//third_party/blink/public/strings",
      "//third_party/ced",
@@ -91,10 +91,10 @@
  #include "ui/accessibility/accessibility_features.h"
  #include "ui/base/ui_base_features.h"
  #include "ui/events/blink/blink_features.h"
-@@ -455,6 +456,10 @@ void SetRuntimeFeaturesFromCommandLine(c
-        switches::kEnableAccessibilityObjectModel, true},
-       {wrf::EnableAllowSyncXHRInPageDismissal,
-        switches::kAllowSyncXHRInPageDismissal, true},
+@@ -460,6 +461,10 @@ void SetRuntimeFeaturesFromCommandLine(c
+       {wrf::EnableWebGPU, switches::kEnableUnsafeWebGPU, true},
+       {wrf::ForceOverlayFullscreenVideo, switches::kForceOverlayFullscreenVideo,
+        true},
 +      {wrf::EnableFingerprintingClientRectsNoise,
 +       switches::kFingerprintingClientRectsNoise, true},
 +      {wrf::EnableFingerprintingCanvasMeasureTextNoise,
@@ -104,7 +104,7 @@
      if (command_line.HasSwitch(mapping.switch_name))
 --- a/third_party/blink/public/platform/web_runtime_features.h
 +++ b/third_party/blink/public/platform/web_runtime_features.h
-@@ -199,6 +199,8 @@ class WebRuntimeFeatures {
+@@ -209,6 +209,8 @@ class WebRuntimeFeatures {
    BLINK_PLATFORM_EXPORT static void EnableGetDisplayMedia(bool);
    BLINK_PLATFORM_EXPORT static void EnableGetCurrentBrowsingContextMedia(bool);
    BLINK_PLATFORM_EXPORT static void EnableAllowSyncXHRInPageDismissal(bool);
@@ -115,7 +115,7 @@
    EnableSignedExchangePrefetchCacheForNavigations(bool);
 --- a/third_party/blink/renderer/core/dom/document.cc
 +++ b/third_party/blink/renderer/core/dom/document.cc
-@@ -42,6 +42,7 @@
+@@ -43,6 +43,7 @@
  #include "base/macros.h"
  #include "base/metrics/histogram_functions.h"
  #include "base/optional.h"
@@ -123,7 +123,7 @@
  #include "base/time/time.h"
  #include "cc/input/overscroll_behavior.h"
  #include "cc/input/scroll_snap_data.h"
-@@ -924,6 +925,14 @@ Range* Document::CreateRangeAdjustedToTr
+@@ -864,6 +865,14 @@ Range* Document::CreateRangeAdjustedToTr
                                       Position::BeforeNode(*shadow_host));
  }
  
@@ -138,7 +138,7 @@
  SelectorQueryCache& Document::GetSelectorQueryCache() {
    if (!selector_query_cache_)
      selector_query_cache_ = std::make_unique<SelectorQueryCache>();
-@@ -2430,6 +2439,15 @@ void Document::UpdateStyleAndLayoutTree(
+@@ -2386,6 +2395,15 @@ void Document::UpdateStyleAndLayoutTreeF
  #if DCHECK_IS_ON()
    AssertLayoutTreeUpdated(*this);
  #endif
@@ -156,7 +156,7 @@
  void Document::InvalidateStyleAndLayoutForFontUpdates() {
 --- a/third_party/blink/renderer/core/dom/document.h
 +++ b/third_party/blink/renderer/core/dom/document.h
-@@ -442,6 +442,10 @@ class CORE_EXPORT Document : public Cont
+@@ -444,6 +444,10 @@ class CORE_EXPORT Document : public Cont
      has_xml_declaration_ = has_xml_declaration ? 1 : 0;
    }
  
@@ -167,7 +167,7 @@
    AtomicString visibilityState() const;
    bool IsPageVisible() const;
    bool hidden() const;
-@@ -1967,6 +1971,9 @@ class CORE_EXPORT Document : public Cont
+@@ -1998,6 +2002,9 @@ class CORE_EXPORT Document : public Cont
  
    base::ElapsedTimer start_time_;
  
@@ -179,7 +179,7 @@
    HeapVector<Member<ScriptElementBase>> current_script_stack_;
 --- a/third_party/blink/renderer/core/dom/element.cc
 +++ b/third_party/blink/renderer/core/dom/element.cc
-@@ -2057,6 +2057,11 @@ DOMRectList* Element::getClientRects() {
+@@ -2075,6 +2075,11 @@ DOMRectList* Element::getClientRects() {
    DCHECK(element_layout_object);
    GetDocument().AdjustFloatQuadsForScrollAndAbsoluteZoom(
        quads, *element_layout_object);
@@ -191,14 +191,14 @@
    return MakeGarbageCollected<DOMRectList>(quads);
  }
  
-@@ -2074,6 +2079,9 @@ DOMRect* Element::getBoundingClientRect(
+@@ -2092,6 +2097,9 @@ FloatRect Element::GetBoundingClientRect
    DCHECK(element_layout_object);
    GetDocument().AdjustFloatRectForScrollAndAbsoluteZoom(result,
                                                          *element_layout_object);
 +  if (RuntimeEnabledFeatures::FingerprintingClientRectsNoiseEnabled()) {
 +    result.Scale(GetDocument().GetNoiseFactorX(), GetDocument().GetNoiseFactorY());
 +  }
-   return DOMRect::FromFloatRect(result);
+   return result;
  }
  
 --- a/third_party/blink/renderer/core/dom/range.cc
@@ -266,7 +266,7 @@
                const TextDirection&,
 --- a/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
 +++ b/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
-@@ -965,9 +965,15 @@ TextMetrics* CanvasRenderingContext2D::m
+@@ -964,9 +964,15 @@ TextMetrics* CanvasRenderingContext2D::m
    else
      direction = ToTextDirection(GetState().GetDirection(), canvas());
  
@@ -282,12 +282,12 @@
 +  return text_metrics;
  }
  
- void CanvasRenderingContext2D::DrawTextInternal(
+ void CanvasRenderingContext2D::fillFormattedText(
 --- a/third_party/blink/renderer/platform/BUILD.gn
 +++ b/third_party/blink/renderer/platform/BUILD.gn
-@@ -1640,6 +1640,7 @@ component("platform") {
-     "//cc/mojo_embedder",
+@@ -1656,6 +1656,7 @@ component("platform") {
      "//components/paint_preview/common",
+     "//components/power_scheduler",
      "//components/search_engines:search_engine_utils",
 +    "//components/ungoogled:ungoogled_switches",
      "//components/viz/client",
@@ -295,7 +295,7 @@
      "//crypto",
 --- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
 +++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
-@@ -643,4 +643,12 @@ void WebRuntimeFeatures::EnableCSSColorS
+@@ -671,4 +671,12 @@ void WebRuntimeFeatures::EnableCSSColorS
    RuntimeEnabledFeatures::SetCSSColorSchemeUARenderingEnabled(enable);
  }
  
@@ -310,7 +310,7 @@
  }  // namespace blink
 --- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
 +++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
-@@ -894,6 +894,12 @@
+@@ -951,6 +951,12 @@
        status: "experimental",
      },
      {
@@ -320,6 +320,6 @@
 +      name: "FingerprintingCanvasMeasureTextNoise",
 +    },
 +    {
-       name: "FlexAspectRatio",
-       status: "stable",
+       name: "FocuslessSpatialNavigation",
+       settable_from_internals: true,
      },

+ 11 - 11
patches/extra/bromite/flag-fingerprinting-canvas-image-data-noise.patch

@@ -34,7 +34,7 @@ approach to change color components.
  #endif  // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
 --- a/content/browser/renderer_host/render_process_host_impl.cc
 +++ b/content/browser/renderer_host/render_process_host_impl.cc
-@@ -3238,6 +3238,7 @@ void RenderProcessHostImpl::PropagateBro
+@@ -3302,6 +3302,7 @@ void RenderProcessHostImpl::PropagateBro
      switches::kFileUrlPathAlias,
      switches::kFingerprintingClientRectsNoise,
      switches::kFingerprintingCanvasMeasureTextNoise,
@@ -44,7 +44,7 @@ approach to change color components.
      switches::kForceGpuMemAvailableMb,
 --- a/content/child/runtime_features.cc
 +++ b/content/child/runtime_features.cc
-@@ -460,6 +460,8 @@ void SetRuntimeFeaturesFromCommandLine(c
+@@ -465,6 +465,8 @@ void SetRuntimeFeaturesFromCommandLine(c
         switches::kFingerprintingClientRectsNoise, true},
        {wrf::EnableFingerprintingCanvasMeasureTextNoise,
         switches::kFingerprintingCanvasMeasureTextNoise, true},
@@ -55,7 +55,7 @@ approach to change color components.
      if (command_line.HasSwitch(mapping.switch_name))
 --- a/third_party/blink/public/platform/web_runtime_features.h
 +++ b/third_party/blink/public/platform/web_runtime_features.h
-@@ -201,6 +201,7 @@ class WebRuntimeFeatures {
+@@ -211,6 +211,7 @@ class WebRuntimeFeatures {
    BLINK_PLATFORM_EXPORT static void EnableAllowSyncXHRInPageDismissal(bool);
    BLINK_PLATFORM_EXPORT static void EnableFingerprintingClientRectsNoise(bool);
    BLINK_PLATFORM_EXPORT static void EnableFingerprintingCanvasMeasureTextNoise(bool);
@@ -65,7 +65,7 @@ approach to change color components.
    EnableSignedExchangePrefetchCacheForNavigations(bool);
 --- a/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
 +++ b/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
-@@ -24,6 +24,7 @@
+@@ -20,6 +20,7 @@
  #include "third_party/blink/renderer/platform/geometry/float_quad.h"
  #include "third_party/blink/renderer/platform/graphics/bitmap_image.h"
  #include "third_party/blink/renderer/platform/graphics/skia/skia_utils.h"
@@ -73,7 +73,7 @@ approach to change color components.
  #include "third_party/blink/renderer/platform/graphics/stroke_data.h"
  #include "third_party/blink/renderer/platform/heap/heap.h"
  
-@@ -1772,6 +1773,11 @@ ImageData* BaseRenderingContext2D::getIm
+@@ -1978,6 +1979,11 @@ ImageData* BaseRenderingContext2D::getIm
            snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
        DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
      }
@@ -87,7 +87,7 @@ approach to change color components.
    // Wrap |contents| in an ImageData.
 --- a/third_party/blink/renderer/platform/BUILD.gn
 +++ b/third_party/blink/renderer/platform/BUILD.gn
-@@ -1602,7 +1602,9 @@ component("platform") {
+@@ -1615,7 +1615,9 @@ component("platform") {
      "//third_party/blink/renderer:non_test_config",
    ]
  
@@ -100,7 +100,7 @@ approach to change color components.
      "//third_party/blink/renderer/platform/blob",
 --- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
 +++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
-@@ -651,4 +651,8 @@ void WebRuntimeFeatures::EnableFingerpri
+@@ -679,4 +679,8 @@ void WebRuntimeFeatures::EnableFingerpri
    RuntimeEnabledFeatures::SetFingerprintingCanvasMeasureTextNoiseEnabled(enable);
  }
  
@@ -156,7 +156,7 @@ approach to change color components.
  #include "v8/include/v8.h"
  
  namespace blink {
-@@ -79,4 +83,154 @@ void StaticBitmapImage::DrawHelper(
+@@ -81,4 +85,154 @@ void StaticBitmapImage::DrawHelper(
                          WebCoreClampingModeToSkiaRectConstraint(clamp_mode));
  }
  
@@ -324,13 +324,13 @@ approach to change color components.
    // Methods overridden by all sub-classes
 --- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
 +++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
-@@ -900,6 +900,9 @@
+@@ -957,6 +957,9 @@
        name: "FingerprintingCanvasMeasureTextNoise",
      },
      {
 +      name: "FingerprintingCanvasImageDataNoise",
 +    },
 +    {
-       name: "FlexAspectRatio",
-       status: "stable",
+       name: "FocuslessSpatialNavigation",
+       settable_from_internals: true,
      },

+ 5 - 5
patches/extra/bromite/flag-max-connections-per-host.patch

@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
 
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -2130,6 +2130,7 @@ static_library("browser") {
+@@ -2132,6 +2132,7 @@ static_library("browser") {
      "//components/net_log",
      "//components/network_hints/common:mojo_bindings",
      "//components/network_session_configurator/browser",
@@ -72,7 +72,7 @@ with limited CPU/memory resources and it is disabled by default.
  #include "components/network_time/network_time_tracker.h"
  #include "components/permissions/permissions_client.h"
  #include "components/policy/core/common/policy_service.h"
-@@ -131,6 +134,7 @@
+@@ -130,6 +133,7 @@
  #include "media/media_buildflags.h"
  #include "mojo/public/cpp/bindings/pending_receiver.h"
  #include "net/log/net_log.h"
@@ -80,7 +80,7 @@ with limited CPU/memory resources and it is disabled by default.
  #include "ppapi/buildflags/buildflags.h"
  #include "printing/buildflags/buildflags.h"
  #include "services/network/public/cpp/features.h"
-@@ -326,6 +330,18 @@ void BrowserProcessImpl::Init() {
+@@ -317,6 +321,18 @@ void BrowserProcessImpl::Init() {
                               base::BindRepeating(&ApplyMetricsReportingPolicy));
  #endif
  
@@ -101,7 +101,7 @@ with limited CPU/memory resources and it is disabled by default.
  
 --- a/chrome/browser/flag_descriptions.cc
 +++ b/chrome/browser/flag_descriptions.cc
-@@ -1391,6 +1391,10 @@ const char kMediaHistoryDescription[] =
+@@ -1451,6 +1451,10 @@ const char kMediaHistoryDescription[] =
      "Enables Media History which records data around media playbacks on "
      "websites.";
  
@@ -114,7 +114,7 @@ with limited CPU/memory resources and it is disabled by default.
  const char kMediaRouterCastAllowAllIPsDescription[] =
 --- a/chrome/browser/flag_descriptions.h
 +++ b/chrome/browser/flag_descriptions.h
-@@ -823,6 +823,9 @@ extern const char kLogJsConsoleMessagesD
+@@ -859,6 +859,9 @@ extern const char kLogJsConsoleMessagesD
  extern const char kMediaHistoryName[];
  extern const char kMediaHistoryDescription[];
  

+ 1 - 1
patches/extra/debian/disable/google-api-warning.patch

@@ -3,7 +3,7 @@ author: Michael Gilbert <mgilbert@debian.org>
 
 --- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
 +++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
-@@ -596,9 +596,6 @@ void StartupBrowserCreatorImpl::AddInfoB
+@@ -598,9 +598,6 @@ void StartupBrowserCreatorImpl::AddInfoB
      }
  #endif
  

+ 1 - 1
patches/extra/debian/disable/welcome-page.patch

@@ -4,7 +4,7 @@ bug-debian: http://bugs.debian.org/857767
 
 --- a/chrome/browser/profiles/profile_manager.cc
 +++ b/chrome/browser/profiles/profile_manager.cc
-@@ -1189,7 +1189,7 @@ void ProfileManager::InitProfileUserPref
+@@ -1200,7 +1200,7 @@ void ProfileManager::InitProfileUserPref
      profile->GetPrefs()->SetString(prefs::kSupervisedUserId,
                                     supervised_user_id);
    }

+ 7 - 7
patches/extra/inox-patchset/0006-modify-default-prefs.patch

@@ -1,7 +1,7 @@
 
 --- a/chrome/browser/background/background_mode_manager.cc
 +++ b/chrome/browser/background/background_mode_manager.cc
-@@ -360,7 +360,7 @@ void BackgroundModeManager::RegisterPref
+@@ -362,7 +362,7 @@ void BackgroundModeManager::RegisterPref
    registry->RegisterBooleanPref(prefs::kChromeCreatedLoginItem, false);
    registry->RegisterBooleanPref(prefs::kMigratedLoginItemPref, false);
  #endif
@@ -12,7 +12,7 @@
  void BackgroundModeManager::RegisterProfile(Profile* profile) {
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -1338,7 +1338,7 @@ void ChromeContentBrowserClient::Registe
+@@ -1238,7 +1238,7 @@ void ChromeContentBrowserClient::Registe
  void ChromeContentBrowserClient::RegisterProfilePrefs(
      user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
@@ -56,7 +56,7 @@
    registry->RegisterBooleanPref(prefs::kGloballyScopeHTTPAuthCacheEnabled,
 --- a/chrome/browser/profiles/profile.cc
 +++ b/chrome/browser/profiles/profile.cc
-@@ -248,7 +248,7 @@ const char Profile::kProfileKey[] = "__P
+@@ -247,7 +247,7 @@ const char Profile::kProfileKey[] = "__P
  void Profile::RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(
        prefs::kSearchSuggestEnabled,
@@ -78,7 +78,7 @@
      </cr-dialog>
 --- a/chrome/browser/signin/account_consistency_mode_manager.cc
 +++ b/chrome/browser/signin/account_consistency_mode_manager.cc
-@@ -117,7 +117,7 @@ void AccountConsistencyModeManager::Regi
+@@ -116,7 +116,7 @@ void AccountConsistencyModeManager::Regi
  #if BUILDFLAG(ENABLE_DICE_SUPPORT)
    registry->RegisterBooleanPref(kDiceMigrationCompletePref, false);
  #endif
@@ -140,7 +140,7 @@
        prefs::kAutofillProfileValidity, "",
 --- a/components/bookmarks/browser/bookmark_utils.cc
 +++ b/components/bookmarks/browser/bookmark_utils.cc
-@@ -442,12 +442,12 @@ bool DoesBookmarkContainWords(const base
+@@ -441,12 +441,12 @@ bool DoesBookmarkContainWords(const base
  void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(
        prefs::kShowBookmarkBar,
@@ -154,7 +154,7 @@
 +      false,
        user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
    registry->RegisterBooleanPref(
-       prefs::kShowManagedBookmarksInBookmarkBar,
+       prefs::kShowReadingListInBookmarkBar, true,
 --- a/components/content_settings/core/browser/cookie_settings.cc
 +++ b/components/content_settings/core/browser/cookie_settings.cc
 @@ -62,7 +62,7 @@ void CookieSettings::RegisterProfilePref
@@ -168,7 +168,7 @@
  
 --- a/components/password_manager/core/browser/password_manager.cc
 +++ b/components/password_manager/core/browser/password_manager.cc
-@@ -207,10 +207,10 @@ FormData SimplifiedFormDataFromFormStruc
+@@ -208,10 +208,10 @@ FormData SimplifiedFormDataFromFormStruc
  void PasswordManager::RegisterProfilePrefs(
      user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(

+ 1 - 1
patches/extra/inox-patchset/0016-chromium-sandbox-pie.patch

@@ -1,6 +1,6 @@
 --- a/sandbox/linux/BUILD.gn
 +++ b/sandbox/linux/BUILD.gn
-@@ -323,6 +323,12 @@ if (is_linux || is_chromeos) {
+@@ -327,6 +327,12 @@ if (is_linux || is_chromeos) {
        # These files have a suspicious comparison.
        # TODO fix this and re-enable this warning.
        "-Wno-sign-compare",

+ 3 - 3
patches/extra/ungoogled-chromium/add-flag-for-omnibox-autocomplete-filtering.patch

@@ -79,7 +79,7 @@
  #include "base/feature_list.h"
  #include "base/i18n/break_iterator.h"
  #include "base/i18n/case_conversion.h"
-@@ -646,6 +647,9 @@ void SearchProvider::Run(bool query_is_p
+@@ -643,6 +644,9 @@ void SearchProvider::Run(bool query_is_p
  }
  
  void SearchProvider::DoHistoryQuery(bool minimal_changes) {
@@ -98,8 +98,8 @@
 +#include "base/command_line.h"
  #include "base/files/file_path.h"
  #include "base/files/file_util.h"
- #include "base/strings/string_number_conversions.h"
-@@ -605,6 +606,8 @@ GURL FixupURL(const std::string& text, c
+ #include "base/ranges/algorithm.h"
+@@ -607,6 +608,8 @@ GURL FixupURL(const std::string& text, c
  
      FixupHost(trimmed, parts.host, parts.scheme.is_valid(), desired_tld, &url);
      if (chrome_url && !parts.host.is_valid())

+ 5 - 5
patches/extra/ungoogled-chromium/add-flag-for-pdf-plugin-name.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -5923,7 +5923,7 @@ bool ChromeContentBrowserClient::ShouldA
+@@ -5918,7 +5918,7 @@ bool ChromeContentBrowserClient::ShouldA
      const url::Origin& embedder_origin,
      const content::PepperPluginInfo& plugin_info) {
  #if BUILDFLAG(ENABLE_PDF)
@@ -22,7 +22,7 @@
  }
 --- a/chrome/browser/plugins/pdf_iframe_navigation_throttle_unittest.cc
 +++ b/chrome/browser/plugins/pdf_iframe_navigation_throttle_unittest.cc
-@@ -66,7 +66,7 @@ class PDFIFrameNavigationThrottleTest :
+@@ -64,7 +64,7 @@ class PDFIFrameNavigationThrottleTest :
      // Register a fake PDF Viewer plugin into our plugin service.
      content::WebPluginInfo info;
      info.name =
@@ -264,7 +264,7 @@
    if (enable_plugins) {
 --- a/chrome/common/chrome_content_client.cc
 +++ b/chrome/common/chrome_content_client.cc
-@@ -141,7 +141,7 @@ void ComputeBuiltInPlugins(std::vector<c
+@@ -142,7 +142,7 @@ void ComputeBuiltInPlugins(std::vector<c
    content::PepperPluginInfo pdf_info;
    pdf_info.is_internal = true;
    pdf_info.is_out_of_process = true;
@@ -362,7 +362,7 @@
      FILE_PATH_LITERAL("internal-pdf-viewer");
 --- a/chrome/renderer/chrome_content_renderer_client.cc
 +++ b/chrome/renderer/chrome_content_renderer_client.cc
-@@ -952,7 +952,7 @@ WebPlugin* ChromeContentRendererClient::
+@@ -955,7 +955,7 @@ WebPlugin* ChromeContentRendererClient::
              }
            }
          } else if (info.name ==
@@ -371,7 +371,7 @@
            // Report PDF load metrics. Since the PDF plugin is comprised of an
            // extension that loads a second plugin, avoid double counting by
            // ignoring the creation of the second plugin.
-@@ -988,7 +988,7 @@ WebPlugin* ChromeContentRendererClient::
+@@ -991,7 +991,7 @@ WebPlugin* ChromeContentRendererClient::
          PluginUMAReporter::GetInstance()->ReportPluginDisabled(orig_mime_type,
                                                                 url);
          if (info.name ==

+ 5 - 5
patches/extra/ungoogled-chromium/add-flag-for-search-engine-collection.patch

@@ -52,7 +52,7 @@
  
 --- a/chrome/renderer/chrome_render_frame_observer.h
 +++ b/chrome/renderer/chrome_render_frame_observer.h
-@@ -129,6 +129,7 @@ class ChromeRenderFrameObserver : public
+@@ -134,6 +134,7 @@ class ChromeRenderFrameObserver : public
  #if BUILDFLAG(SAFE_BROWSING_AVAILABLE)
    safe_browsing::PhishingClassifierDelegate* phishing_classifier_ = nullptr;
  #endif
@@ -85,7 +85,7 @@
  // TemplateURLService::LessWithPrefix -----------------------------------------
 @@ -280,6 +287,7 @@ TemplateURLService::TemplateURLService(
      std::unique_ptr<TemplateURLServiceClient> client,
-     const base::Closure& dsp_change_callback)
+     const base::RepeatingClosure& dsp_change_callback)
      : prefs_(prefs),
 +      should_autocollect_(true),
        search_terms_data_(std::move(search_terms_data)),
@@ -102,7 +102,7 @@
  }
  
  bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
-@@ -1446,6 +1454,8 @@ SyncDataMap TemplateURLService::CreateGU
+@@ -1449,6 +1457,8 @@ SyncDataMap TemplateURLService::CreateGU
  
  void TemplateURLService::Init(const Initializer* initializers,
                                int num_initializers) {
@@ -111,7 +111,7 @@
    if (client_)
      client_->SetOwner(this);
  
-@@ -1582,6 +1592,9 @@ void TemplateURLService::ChangeToLoadedS
+@@ -1585,6 +1595,9 @@ void TemplateURLService::ChangeToLoadedS
  
  bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
      const std::string& host) const {
@@ -123,7 +123,7 @@
      return true;
 --- a/components/search_engines/template_url_service.h
 +++ b/components/search_engines/template_url_service.h
-@@ -685,6 +685,8 @@ class TemplateURLService : public WebDat
+@@ -686,6 +686,8 @@ class TemplateURLService : public WebDat
    // ---------- Browser state related members ---------------------------------
    PrefService* prefs_ = nullptr;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-close-window-with-last-tab.patch

@@ -8,7 +8,7 @@
  #include "base/containers/flat_map.h"
  #include "base/metrics/histogram_macros.h"
  #include "base/metrics/user_metrics.h"
-@@ -1748,6 +1749,10 @@ bool TabStripModel::InternalCloseTabs(
+@@ -1752,6 +1753,10 @@ bool TabStripModel::InternalCloseTabs(
    if (items.empty())
      return true;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-configure-extension-downloading.patch

@@ -50,7 +50,7 @@
  bool IsExtensionDownload(const download::DownloadItem& download_item);
 --- a/chrome/browser/download/download_target_determiner.cc
 +++ b/chrome/browser/download/download_target_determiner.cc
-@@ -1034,10 +1034,12 @@ DownloadConfirmationReason DownloadTarge
+@@ -1041,10 +1041,12 @@ DownloadConfirmationReason DownloadTarge
      return DownloadConfirmationReason::SAVE_AS;
  
  #if BUILDFLAG(ENABLE_EXTENSIONS)

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-convert-popups-to-tabs.patch

@@ -13,7 +13,7 @@
  #endif  // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
 --- a/content/renderer/render_view_impl.cc
 +++ b/content/renderer/render_view_impl.cc
-@@ -86,6 +86,8 @@ WindowOpenDisposition RenderViewImpl::Na
+@@ -81,6 +81,8 @@ WindowOpenDisposition RenderViewImpl::Na
      case blink::kWebNavigationPolicyNewWindow:
        return WindowOpenDisposition::NEW_WINDOW;
      case blink::kWebNavigationPolicyNewPopup:

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-hide-crashed-bubble.patch

@@ -3,7 +3,7 @@
 
 --- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
 +++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
-@@ -551,7 +551,8 @@ void StartupBrowserCreatorImpl::AddInfoB
+@@ -553,7 +553,8 @@ void StartupBrowserCreatorImpl::AddInfoB
    if (command_line_.HasSwitch(switches::kKioskMode))
      return;
  

+ 5 - 5
patches/extra/ungoogled-chromium/add-flag-to-scroll-tabs.patch

@@ -8,8 +8,8 @@
  #include "base/metrics/user_metrics.h"
  #include "base/task/post_task.h"
  #include "base/task/thread_pool.h"
-@@ -101,6 +102,18 @@ int GetDropEffect(const ui::DropTargetEv
-   return ui::DragDropTypes::DRAG_MOVE;
+@@ -105,6 +106,18 @@ DragOperation GetDropEffect(const ui::Dr
+   return DragOperation::kMove;
  }
  
 +bool ShouldScrollChangesTab() {
@@ -27,7 +27,7 @@
  }  // namespace
  
  BrowserRootView::DropInfo::DropInfo() = default;
-@@ -115,7 +128,9 @@ const char BrowserRootView::kViewClassNa
+@@ -116,7 +129,9 @@ BrowserRootView::DropInfo::~DropInfo() {
  
  BrowserRootView::BrowserRootView(BrowserView* browser_view,
                                   views::Widget* widget)
@@ -38,7 +38,7 @@
  
  BrowserRootView::~BrowserRootView() {
    // It's possible to destroy the browser while a drop is active.  In this case,
-@@ -265,7 +280,7 @@ bool BrowserRootView::OnMouseWheel(const
+@@ -263,7 +278,7 @@ bool BrowserRootView::OnMouseWheel(const
  
    // Scroll-event-changes-tab is incompatible with scrolling tabstrip, so
    // disable it if the latter feature is enabled.
@@ -49,7 +49,7 @@
      // tabstrip, or the empty space beside the tabstrip.
 --- a/chrome/browser/ui/views/frame/browser_root_view.h
 +++ b/chrome/browser/ui/views/frame/browser_root_view.h
-@@ -129,6 +129,8 @@ class BrowserRootView : public views::in
+@@ -130,6 +130,8 @@ class BrowserRootView : public views::in
    int scroll_remainder_x_ = 0;
    int scroll_remainder_y_ = 0;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-show-avatar-button.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
 +++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
-@@ -241,14 +241,30 @@ void ToolbarView::Init() {
+@@ -243,14 +243,30 @@ void ToolbarView::Init() {
  
    std::unique_ptr<ToolbarAccountIconContainerView>
        toolbar_account_icon_container;

+ 7 - 7
patches/extra/ungoogled-chromium/add-ipv6-probing-option.patch

@@ -13,9 +13,9 @@
  #endif  // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
 --- a/net/base/features.cc
 +++ b/net/base/features.cc
-@@ -199,5 +199,7 @@ constexpr base::Feature kFirstPartySets{
- const base::FeatureParam<bool> kFirstPartySetsIsDogfooder{
-     &kFirstPartySets, "FirstPartySetsIsDogfooder", false};
+@@ -205,5 +205,7 @@ const base::Feature kSameSiteCookiesBugf
+ const base::Feature kNoCookieChangeNotificationOnLoad{
+     "NoCookieChangeNotificationOnLoad", base::FEATURE_DISABLED_BY_DEFAULT};
  
 +const base::Feature kSetIpv6ProbeFalse{"SetIpv6ProbeFalse", base::FEATURE_DISABLED_BY_DEFAULT};
 +
@@ -23,9 +23,9 @@
  }  // namespace net
 --- a/net/base/features.h
 +++ b/net/base/features.h
-@@ -294,6 +294,8 @@ NET_EXPORT extern const base::Feature kF
- // feature.
- NET_EXPORT extern const base::FeatureParam<bool> kFirstPartySetsIsDogfooder;
+@@ -308,6 +308,8 @@ NET_EXPORT extern const base::Feature kS
+ // notifications are still dispatched as usual.
+ NET_EXPORT extern const base::Feature kNoCookieChangeNotificationOnLoad;
  
 +NET_EXPORT extern const base::Feature kSetIpv6ProbeFalse;
 +
@@ -46,7 +46,7 @@
  enum DnsResolveStatus {
    RESOLVE_STATUS_DNS_SUCCESS = 0,
    RESOLVE_STATUS_PROC_SUCCESS,
-@@ -3370,7 +3365,7 @@ bool HostResolverManager::IsIPv6Reachabl
+@@ -3327,7 +3322,7 @@ bool HostResolverManager::IsIPv6Reachabl
        (tick_clock_->NowTicks() - last_ipv6_probe_time_).InMilliseconds() >
            kIPv6ProbePeriodMs) {
      SetLastIPv6ProbeResult(

+ 3 - 3
patches/extra/ungoogled-chromium/add-suggestions-url-field.patch

@@ -417,7 +417,7 @@
  
 --- a/components/search_engines/template_url_service.cc
 +++ b/components/search_engines/template_url_service.cc
-@@ -640,7 +640,8 @@ void TemplateURLService::IncrementUsageC
+@@ -643,7 +643,8 @@ void TemplateURLService::IncrementUsageC
  void TemplateURLService::ResetTemplateURL(TemplateURL* url,
                                            const base::string16& title,
                                            const base::string16& keyword,
@@ -427,7 +427,7 @@
    DCHECK(!IsCreatedByExtension(url));
    DCHECK(!keyword.empty());
    DCHECK(!search_url.empty());
-@@ -654,6 +655,7 @@ void TemplateURLService::ResetTemplateUR
+@@ -657,6 +658,7 @@ void TemplateURLService::ResetTemplateUR
    }
    data.safe_for_autoreplace = false;
    data.last_modified = clock_->Now();
@@ -437,7 +437,7 @@
  
 --- a/components/search_engines/template_url_service.h
 +++ b/components/search_engines/template_url_service.h
-@@ -251,7 +251,8 @@ class TemplateURLService : public WebDat
+@@ -252,7 +252,8 @@ class TemplateURLService : public WebDat
    void ResetTemplateURL(TemplateURL* url,
                          const base::string16& title,
                          const base::string16& keyword,

+ 1 - 1
patches/extra/ungoogled-chromium/add-ungoogled-flag-headers.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/about_flags.cc
 +++ b/chrome/browser/about_flags.cc
-@@ -2570,7 +2570,13 @@ const FeatureEntry::FeatureVariation kPa
+@@ -2601,7 +2601,13 @@ constexpr char kWallpaperWebUIInternalNa
  // calculate and verify checksum.
  //
  // When adding a new choice, add it to the end of the list.

+ 5 - 2
patches/extra/ungoogled-chromium/disable-download-quarantine.patch

@@ -10,7 +10,7 @@
  #include "crypto/secure_hash.h"
  
  #if defined(OS_WIN)
-@@ -533,130 +532,12 @@ DownloadInterruptReason BaseFile::Publis
+@@ -533,133 +532,12 @@ DownloadInterruptReason BaseFile::Publis
  }
  #endif  // defined(OS_ANDROID)
  
@@ -75,6 +75,9 @@
 -    // ftp:// has an authority.
 -    if (source_url.SchemeIs(url::kFtpScheme))
 -      return source_url;
+-
+-    if (source_url.SchemeIs(url::kBlobScheme))
+-      return url::Origin::Create(source_url).GetURL();
 -  }
 -
 -  if (referrer_url.is_valid() && referrer_url.SchemeIsHTTPOrHTTPS())
@@ -141,7 +144,7 @@
  
  void BaseFile::AnnotateWithSourceInformation(
      const std::string& client_guid,
-@@ -664,30 +545,8 @@ void BaseFile::AnnotateWithSourceInforma
+@@ -667,30 +545,8 @@ void BaseFile::AnnotateWithSourceInforma
      const GURL& referrer_url,
      mojo::PendingRemote<quarantine::mojom::Quarantine> remote_quarantine,
      OnAnnotationDoneCallback on_annotation_done_callback) {

+ 2 - 2
patches/extra/ungoogled-chromium/disable-webgl-renderer-info.patch

@@ -3,7 +3,7 @@
 
 --- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
 +++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
-@@ -3691,8 +3691,7 @@ ScriptValue WebGLRenderingContextBase::g
+@@ -3552,8 +3552,7 @@ ScriptValue WebGLRenderingContextBase::g
                pname, IdentifiabilityBenignStringToken(
                           String(ContextGL()->GetString(GL_RENDERER))));
          }
@@ -13,7 +13,7 @@
        }
        SynthesizeGLError(
            GL_INVALID_ENUM, "getParameter",
-@@ -3706,8 +3705,7 @@ ScriptValue WebGLRenderingContextBase::g
+@@ -3567,8 +3566,7 @@ ScriptValue WebGLRenderingContextBase::g
                pname, IdentifiabilityBenignStringToken(
                           String(ContextGL()->GetString(GL_VENDOR))));
          }

+ 1 - 1
patches/extra/ungoogled-chromium/enable-default-prefetch-privacy-changes.patch

@@ -2,7 +2,7 @@
 
 --- a/third_party/blink/common/features.cc
 +++ b/third_party/blink/common/features.cc
-@@ -322,7 +322,7 @@ const base::Feature kFontAccessChooser{"
+@@ -334,7 +334,7 @@ const base::Feature kComputePressure{"Co
  // Prefetch request properties are updated to be privacy-preserving. See
  // crbug.com/988956.
  const base::Feature kPrefetchPrivacyChanges{"PrefetchPrivacyChanges",

+ 2 - 2
patches/extra/ungoogled-chromium/enable-page-saving-on-more-pages.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/ui/browser_commands.cc
 +++ b/chrome/browser/ui/browser_commands.cc
-@@ -407,11 +407,6 @@ int GetContentRestrictions(const Browser
+@@ -411,11 +411,6 @@ int GetContentRestrictions(const Browser
      CoreTabHelper* core_tab_helper =
          CoreTabHelper::FromWebContents(current_tab);
      content_restrictions = core_tab_helper->content_restrictions();
@@ -14,7 +14,7 @@
    }
    return content_restrictions;
  }
-@@ -1202,8 +1197,7 @@ bool CanSavePage(const Browser* browser)
+@@ -1249,8 +1244,7 @@ bool CanSavePage(const Browser* browser)
            prefs::kAllowFileSelectionDialogs)) {
      return false;
    }

+ 2 - 2
patches/extra/ungoogled-chromium/enable-paste-and-go-new-tab-button.patch

@@ -13,7 +13,7 @@
        AddChildView(std::make_unique<views::InkDropContainerView>());
 --- a/chrome/browser/ui/views/tabs/tab_strip.cc
 +++ b/chrome/browser/ui/views/tabs/tab_strip.cc
-@@ -2605,8 +2605,6 @@ void TabStrip::NewTabButtonPressed(const
+@@ -2660,8 +2660,6 @@ void TabStrip::NewTabButtonPressed(const
  
      const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
      if (mouse.IsOnlyMiddleMouseButton()) {
@@ -22,7 +22,7 @@
          ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
          CHECK(clipboard);
          base::string16 clipboard_text;
-@@ -2614,7 +2612,6 @@ void TabStrip::NewTabButtonPressed(const
+@@ -2669,7 +2667,6 @@ void TabStrip::NewTabButtonPressed(const
                              /* data_dst = */ nullptr, &clipboard_text);
          if (!clipboard_text.empty())
            controller_->CreateNewTabWithLocation(clipboard_text);

+ 3 - 17
patches/extra/ungoogled-chromium/remove-uneeded-ui.patch

@@ -67,20 +67,6 @@
          <template is="dom-if" if="[[showPage_(pageVisibility.privacy)]]"
              restamp>
            <settings-section page-title="$i18n{privacyPageTitle}"
---- a/chrome/browser/resources/settings/languages_page/languages_page.html
-+++ b/chrome/browser/resources/settings/languages_page/languages_page.html
-@@ -219,11 +219,6 @@
-                 </a>
-               </div>
-             </div>
--            <settings-toggle-button id="offerTranslateOtherLanguages"
--                pref="{{prefs.translate.enabled}}"
--                label="$i18n{offerToEnableTranslate}"
--                on-settings-boolean-control-change="onTranslateToggleChange_">
--            </settings-toggle-button>
-           </iron-collapse>
-           <settings-toggle-button
-               id="enableSpellcheckingToggle"
 --- a/chrome/browser/resources/settings/privacy_page/personalization_options.html
 +++ b/chrome/browser/resources/settings/privacy_page/personalization_options.html
 @@ -35,7 +35,7 @@
@@ -135,7 +121,7 @@
              <iron-icon icon="cr:security"></iron-icon>
 --- a/chrome/browser/ui/views/profiles/profile_menu_view.cc
 +++ b/chrome/browser/ui/views/profiles/profile_menu_view.cc
-@@ -217,6 +217,7 @@ void ProfileMenuView::BuildMenu() {
+@@ -220,6 +220,7 @@ void ProfileMenuView::BuildMenu() {
  }
  
  gfx::ImageSkia ProfileMenuView::GetSyncIcon() const {
@@ -143,7 +129,7 @@
    Profile* profile = browser()->profile();
  
    if (!profile->IsRegularProfile())
-@@ -514,8 +515,7 @@ void ProfileMenuView::BuildIdentity() {
+@@ -517,8 +518,7 @@ void ProfileMenuView::BuildIdentity() {
          menu_title_, menu_subtitle_);
    } else {
      menu_title_ = base::string16();
@@ -153,7 +139,7 @@
      SetProfileIdentityInfo(
          profile_name, background_color, edit_button_params,
          ui::ImageModel::FromImage(
-@@ -586,6 +586,7 @@ void ProfileMenuView::BuildSyncInfo() {
+@@ -589,6 +589,7 @@ void ProfileMenuView::BuildSyncInfo() {
      return;
    }
  

+ 0 - 1
patches/series

@@ -33,7 +33,6 @@ core/ungoogled-chromium/fix-building-without-safebrowsing.patch
 core/ungoogled-chromium/remove-unused-preferences-fields.patch
 core/ungoogled-chromium/fix-building-without-enabling-reporting.patch
 core/ungoogled-chromium/block-requests.patch
-core/ungoogled-chromium/remove-enable-dse-memoryssa-cflag.patch
 core/bromite/disable-fetching-field-trials.patch
 
 extra/inox-patchset/0006-modify-default-prefs.patch

+ 244 - 6
pruning.list

@@ -75,7 +75,7 @@ chrome/browser/resources/default_apps/youtube.crx
 chrome/browser/resources/media/mei_preload/preloaded_data.pb
 chrome/browser/ui/app_list/search/search_result_ranker/20190722_example_preprocessor_config.pb
 chrome/browser/ui/app_list/search/search_result_ranker/search_ranker_assets/20190923_example_preprocessor_config.pb
-chrome/build/pgo_profiles/chrome-linux-4389-1615484746-845f8166c73d01aac66fc676e3122d92508416a9.profdata
+chrome/build/pgo_profiles/chrome-linux-4430-1618246478-03950c14a967f79c90156be9dea8a8a0fc8d8ba9.profdata
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/Network Share Test.lnk
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/New folder - Shortcut.lnk
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/long_name.lnk
@@ -197,11 +197,13 @@ components/test/data/history/HistoryNoDuration
 components/test/data/history/HistoryNoSource
 components/test/data/history/History_with_starred
 components/test/data/omnibox/on_device_head_test_model_index.bin
+components/test/data/optimization_guide/simple_test.tflite
 components/test/data/paint_preview/PaintPreviewTestService/wikipedia/150869817BD7A616833436F122EF294C.skp
 components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03E9107A321304E21C0A644.skp
 components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
 components/test/data/printing/unsorted_custompapers.plist
 components/test/data/sessions/last_session
+components/test/data/translate/valid_model.tflite
 components/test/data/unzip_service/good_archive.zip
 components/test/data/update_client/ChromeRecovery.crx3
 components/test/data/update_client/binary_bsdiff_patch.bin
@@ -4741,8 +4743,6 @@ third_party/afl/src/testcases/images/jxr/not_kitty.jxr
 third_party/afl/src/testcases/images/tiff/not_kitty.tiff
 third_party/afl/src/testcases/multimedia/h264/small_movie.mp4
 third_party/afl/src/testcases/others/pcap/small_capture.pcap
-third_party/android_deps/local_modifications/androidx_fragment_fragment/androidx_fragment_fragment_java.jar
-third_party/android_deps/local_modifications/androidx_preference_preference/androidx_preference_preference_java.jar
 third_party/angle/samples/multi_texture/basemap.tga
 third_party/angle/samples/multi_texture/lightmap.tga
 third_party/angle/samples/particle_system/smoke.tga
@@ -9547,6 +9547,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-EC
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-GCM.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-KW.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-KWP.bz2
+third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-XTS.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-TDES-CBC.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-TDES-ECB.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/CMAC-AES.bz2
@@ -9571,6 +9572,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-ECB
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-GCM.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-KW.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-KWP.bz2
+third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-XTS.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-TDES-CBC.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-TDES-ECB.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/CMAC-AES.bz2
@@ -9581,7 +9583,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-25
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-384.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-512.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-ECC-SSC.bz2
-third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-FFC.bz2
+third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-FFC-SSC.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KDF.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/RSA.bz2
 third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/SHA-1.bz2
@@ -12796,6 +12798,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5769590820044800
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-6306977171374080
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4880059756969984
+third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4901143794810880
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5067936541179904
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5077547978588160
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5121706490593280
@@ -12806,6 +12809,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5169035432165376
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5181909018345472
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5206191479455744
+third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5345734743031808
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5359635656605696
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5521982557782016
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5542653037903872
@@ -12867,7 +12871,6 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5735719311507456
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5738978499624960
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5739000398086144
-third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5741295280848896
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5741735372914688
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5743250149736448
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5745268385906688
@@ -12897,6 +12900,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6246465148813312
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6276691949518848
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6316256152780800
+third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6372147008241664
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6543700493598720
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6651660668502016
 third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5203067375976448
@@ -13441,6 +13445,26 @@ third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multipl
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.41,43.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.41.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.retain-all-codepoint.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43,44.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43,45.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,44.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,45.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,43.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.retain-all-codepoint.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43,44.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43,45.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,44.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,45.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,43.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.retain-all-codepoint.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43,44.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43,45.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43.otf
@@ -13479,6 +13503,12 @@ third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.30,31,32,33.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.41,42,43.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.retain-all-codepoint.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.41,42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.41.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.41,42.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.41.otf
+third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.42.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53A9,53F1.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53A9.otf
 third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53F1.otf
@@ -13515,7 +13545,9 @@ third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos2_1_font7.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos2_2_font5.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos3_font3.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos4_multiple_anchors_1.otf
+third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos5_font1.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos6_font1.otf
+third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos9_font2.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining1_multiple_subrules_f1.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining2_multiple_subrules_f1.otf
 third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining3_simple_f1.otf
@@ -15629,6 +15661,126 @@ third_party/libxml/fuzz/seed_corpus/da0113f5e076c5cc48013f0bb94a647225494fdb
 third_party/libxml/fuzz/seed_corpus/eb36d039e3d4684168e891f622ac594cc3fbaf42
 third_party/libxml/fuzz/seed_corpus/fbcdd7a1e0f5b2e115172130a7c514ac9a6dd62d
 third_party/libxml/fuzz/seed_corpus/fbd91b3106732ac8dbbb4e004059863e5f52c13c
+third_party/libxml/src/fuzz/seed/uri/full
+third_party/libzip/src/regress/bigstored.zh
+third_party/libzip/src/regress/bigzero-zip.zip
+third_party/libzip/src/regress/broken.zip
+third_party/libzip/src/regress/cm-default.zip
+third_party/libzip/src/regress/encrypt-aes128-noentropy.zip
+third_party/libzip/src/regress/encrypt-aes128.zip
+third_party/libzip/src/regress/encrypt-aes192-noentropy.zip
+third_party/libzip/src/regress/encrypt-aes192.zip
+third_party/libzip/src/regress/encrypt-aes256-noentropy.zip
+third_party/libzip/src/regress/encrypt-aes256.zip
+third_party/libzip/src/regress/encrypt-none.zip
+third_party/libzip/src/regress/encrypt-pkware-noentropy.zip
+third_party/libzip/src/regress/encrypt.zip
+third_party/libzip/src/regress/encrypt_plus_extra.zip
+third_party/libzip/src/regress/encrypt_plus_extra_modified_c.zip
+third_party/libzip/src/regress/encrypt_plus_extra_modified_l.zip
+third_party/libzip/src/regress/extra_field_align_1-0.zip
+third_party/libzip/src/regress/extra_field_align_1-ef_00.zip
+third_party/libzip/src/regress/extra_field_align_1-ef_ff.zip
+third_party/libzip/src/regress/extra_field_align_1-ff.zip
+third_party/libzip/src/regress/extra_field_align_2-0.zip
+third_party/libzip/src/regress/extra_field_align_2-ef_00.zip
+third_party/libzip/src/regress/extra_field_align_2-ef_ff.zip
+third_party/libzip/src/regress/extra_field_align_2-ff.zip
+third_party/libzip/src/regress/extra_field_align_3-0.zip
+third_party/libzip/src/regress/extra_field_align_3-ef_00.zip
+third_party/libzip/src/regress/extra_field_align_3-ef_ff.zip
+third_party/libzip/src/regress/extra_field_align_3-ff.zip
+third_party/libzip/src/regress/extra_field_align_4-ff.zip
+third_party/libzip/src/regress/filename_duplicate.zip
+third_party/libzip/src/regress/filename_duplicate_empty.zip
+third_party/libzip/src/regress/filename_empty.zip
+third_party/libzip/src/regress/fileorder.zip
+third_party/libzip/src/regress/firstsecond-split-deflated.zip
+third_party/libzip/src/regress/firstsecond-split-stored.zip
+third_party/libzip/src/regress/firstsecond.zip
+third_party/libzip/src/regress/foo-stored.zip
+third_party/libzip/src/regress/gap-add.zip
+third_party/libzip/src/regress/gap-delete.zip
+third_party/libzip/src/regress/gap-replace.zip
+third_party/libzip/src/regress/gap.zip
+third_party/libzip/src/regress/incons-archive-comment-longer.zip
+third_party/libzip/src/regress/incons-archive-comment-shorter.zip
+third_party/libzip/src/regress/incons-cdoffset.zip
+third_party/libzip/src/regress/incons-central-compression-method.zip
+third_party/libzip/src/regress/incons-central-compsize-larger-toolarge.zip
+third_party/libzip/src/regress/incons-central-compsize-larger.zip
+third_party/libzip/src/regress/incons-central-compsize-smaller.zip
+third_party/libzip/src/regress/incons-central-crc.zip
+third_party/libzip/src/regress/incons-central-date.zip
+third_party/libzip/src/regress/incons-central-file-comment-longer.zip
+third_party/libzip/src/regress/incons-central-file-comment-shorter.zip
+third_party/libzip/src/regress/incons-central-magic-bad.zip
+third_party/libzip/src/regress/incons-central-magic-bad2.zip
+third_party/libzip/src/regress/incons-central-size-larger.zip
+third_party/libzip/src/regress/incons-data.zip
+third_party/libzip/src/regress/incons-ef-central-size-wrong.zip
+third_party/libzip/src/regress/incons-ef-local-id-size.zip
+third_party/libzip/src/regress/incons-ef-local-id.zip
+third_party/libzip/src/regress/incons-ef-local-size.zip
+third_party/libzip/src/regress/incons-eocd-magic-bad.zip
+third_party/libzip/src/regress/incons-file-count-high.zip
+third_party/libzip/src/regress/incons-file-count-low.zip
+third_party/libzip/src/regress/incons-file-count-overflow.zip
+third_party/libzip/src/regress/incons-local-compression-method.zip
+third_party/libzip/src/regress/incons-local-compsize-larger.zip
+third_party/libzip/src/regress/incons-local-compsize-smaller.zip
+third_party/libzip/src/regress/incons-local-crc.zip
+third_party/libzip/src/regress/incons-local-filename-long.zip
+third_party/libzip/src/regress/incons-local-filename-missing.zip
+third_party/libzip/src/regress/incons-local-filename-short.zip
+third_party/libzip/src/regress/incons-local-filename.zip
+third_party/libzip/src/regress/incons-local-magic-bad.zip
+third_party/libzip/src/regress/incons-local-size-larger.zip
+third_party/libzip/src/regress/junk-at-end.zip
+third_party/libzip/src/regress/junk-at-start.zip
+third_party/libzip/src/regress/large-uncompressable
+third_party/libzip/src/regress/manyfiles-zip.zip
+third_party/libzip/src/regress/multidisk.zip
+third_party/libzip/src/regress/rename_ok.zip
+third_party/libzip/src/regress/stat_index_cp437_raw.test
+third_party/libzip/src/regress/streamed-zip64.zip
+third_party/libzip/src/regress/streamed.zip
+third_party/libzip/src/regress/test-cp437-comment-utf-8.zip
+third_party/libzip/src/regress/test-cp437-fc-utf-8-filename.zip
+third_party/libzip/src/regress/test-cp437-fc.zip
+third_party/libzip/src/regress/test-cp437.zip
+third_party/libzip/src/regress/test-utf8-unmarked.zip
+third_party/libzip/src/regress/test-utf8.zip
+third_party/libzip/src/regress/test.zip
+third_party/libzip/src/regress/test2.zip
+third_party/libzip/src/regress/testbuffer.zip
+third_party/libzip/src/regress/testbzip2.zip
+third_party/libzip/src/regress/testchanged.zip
+third_party/libzip/src/regress/testchangedlocal.zip
+third_party/libzip/src/regress/testcomment.zip
+third_party/libzip/src/regress/testcomment13.zip
+third_party/libzip/src/regress/testcommentremoved.zip
+third_party/libzip/src/regress/testdeflated.zip
+third_party/libzip/src/regress/testdeflated2.zip
+third_party/libzip/src/regress/testdir.zip
+third_party/libzip/src/regress/testempty.zip
+third_party/libzip/src/regress/testextrabytes.zip
+third_party/libzip/src/regress/testfile-UTF8.zip
+third_party/libzip/src/regress/testfile-cp437.zip
+third_party/libzip/src/regress/testfile-lzma.zip
+third_party/libzip/src/regress/testfile-plus-extra.zip
+third_party/libzip/src/regress/testfile-stored-dos.zip
+third_party/libzip/src/regress/testfile-xz.zip
+third_party/libzip/src/regress/testfile.zip
+third_party/libzip/src/regress/testfile0.zip
+third_party/libzip/src/regress/testfile2014.zip
+third_party/libzip/src/regress/teststdin.zip
+third_party/libzip/src/regress/teststored.zip
+third_party/libzip/src/regress/utf-8-standardization-input.zip
+third_party/libzip/src/regress/utf-8-standardization-output.zip
+third_party/libzip/src/regress/zip-in-archive-comment.zip
+third_party/libzip/src/regress/zip64-3mf.zip
+third_party/libzip/src/regress/zip64.zip
 third_party/llvm/clang-tools-extra/clangd/test/index-serialization/Inputs/sample.idx
 third_party/llvm/clang/test/CodeGen/Inputs/thinlto-distributed-backend-skip.bc
 third_party/llvm/clang/test/Driver/at_file.c.args.utf16le
@@ -16030,6 +16182,8 @@ third_party/llvm/llvm/test/Object/Inputs/GNU.a
 third_party/llvm/llvm/test/Object/Inputs/IsNAN.o
 third_party/llvm/llvm/test/Object/Inputs/MacOSX.a
 third_party/llvm/llvm/test/Object/Inputs/SVR4.a
+third_party/llvm/llvm/test/Object/Inputs/WASM/bad-reloc-type.wasm
+third_party/llvm/llvm/test/Object/Inputs/WASM/bad-symbol-type.wasm
 third_party/llvm/llvm/test/Object/Inputs/WASM/invalid-section-order.wasm
 third_party/llvm/llvm/test/Object/Inputs/WASM/missing-version.wasm
 third_party/llvm/llvm/test/Object/Inputs/WASM/string-outside-section.wasm
@@ -16278,6 +16432,8 @@ third_party/llvm/llvm/test/Other/Inputs/no-block-info.bc
 third_party/llvm/llvm/test/ThinLTO/X86/Inputs/autoupgrade.bc
 third_party/llvm/llvm/test/ThinLTO/X86/Inputs/drop-debug-info.bc
 third_party/llvm/llvm/test/Transforms/GlobalOpt/2007-04-05-Crash.ll
+third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/bad.extbinary.afdo
+third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/ctxsplit.extbinary.afdo
 third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/fnptr.binprof
 third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/function_metadata.compact.afdo
 third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/gcc-simple.afdo
@@ -16371,6 +16527,10 @@ third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/call_return_pc/call
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common.x86_64
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common1.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common2.o
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/dwarf5/dwarf5.o
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/dwarf5/dwarf5.out
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/eh_frame/eh_frame.o
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/eh_frame/eh_frame.out
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/extern.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/extern.out
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/main.o
@@ -16727,6 +16887,7 @@ third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/stub-nosyms.macho-x86
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/stubbed.dylib.macho-x86_64
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/thread.macho-i386
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/truncated-section.dylib.macho-x86_64
+third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info-excess.macho-x86_64
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info-no-relocs.macho-x86_64
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info.macho-arm64
 third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info.macho-x86_64
@@ -16774,7 +16935,11 @@ third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/gcc-sample-profile.gcov
 third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/weight-instr-bar.profdata
 third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/weight-instr-foo.profdata
 third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/inline-cs-noprobe.perfbin
+third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/inline-cs-pseudoprobe.perfbin
 third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/noinline-cs-noprobe.perfbin
+third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/noinline-cs-pseudoprobe.perfbin
+third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/recursion-compression-noprobe.perfbin
+third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/recursion-compression-pseudoprobe.perfbin
 third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/arm64-win1.obj
 third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/arm64-win2.obj
 third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/bad-relocs.obj.coff-i386
@@ -17174,6 +17339,64 @@ third_party/openscreen/src/test/data/cast/receiver/channel/good_crl.pb
 third_party/openscreen/src/test/data/cast/receiver/channel/invalid_time_crl.pb
 third_party/openscreen/src/test/data/cast/receiver/channel/issuer_revoked_crl.pb
 third_party/openscreen/src/test/data/cast/receiver/channel/issuer_serial_revoked_crl.pb
+third_party/ots/src/tests/fonts/bad/00ac7a910785ea3a30655fe386d4cb02b39719aa.otf
+third_party/ots/src/tests/fonts/bad/078400f5718f84841fc43a04fd28d946ddad5e37.otf
+third_party/ots/src/tests/fonts/bad/0da956a1d4dad2962619a3f0a1d87daa677ffcf5.otf
+third_party/ots/src/tests/fonts/bad/0fce4352e04a156a1cb8d4bc344cd2be1dfe7177.otf
+third_party/ots/src/tests/fonts/bad/103ad354e517994c447b9c5c6914a290517cb5ed.otf
+third_party/ots/src/tests/fonts/bad/173c4c23291c983fead3d734afd8a4de504f508e.otf
+third_party/ots/src/tests/fonts/bad/251a4ffb5418b336217a9e7958941192b5a20137.otf
+third_party/ots/src/tests/fonts/bad/2f74c3cb404c60d9a46e883c88d6c10dc3562fad.otf
+third_party/ots/src/tests/fonts/bad/33df9c8b531928c90a3afebf6b15828dd0cad929.otf
+third_party/ots/src/tests/fonts/bad/3b9bcfd57f7f18dd4c45ba51e77b23b3895faa9f.ttc
+third_party/ots/src/tests/fonts/bad/3bfa96a443c19de63f28554b748bf84e57ee51c3.otf
+third_party/ots/src/tests/fonts/bad/410761bc1115173bad3f6b0d3d72103e1dc32f67.otf
+third_party/ots/src/tests/fonts/bad/41542b89c620cc3159dc2f29bd335d48136478da.otf
+third_party/ots/src/tests/fonts/bad/457227a3d4dbf6dd062d251b2ae0c8b31f14c9b8.otf
+third_party/ots/src/tests/fonts/bad/4c8e7bcd6b657941c4e846f6e48bb714fb3faf92.otf
+third_party/ots/src/tests/fonts/bad/56d013275a9626c7b10b677fba1d5d4752eec51f.otf
+third_party/ots/src/tests/fonts/bad/58c575a08b375e51c9776275c5f877396ddf552b.otf
+third_party/ots/src/tests/fonts/bad/5c67809a0d4b9a16d9eba881282f920153b761eb.otf
+third_party/ots/src/tests/fonts/bad/68bfc9f9233e34db2c5ecb5fb966bf205f92079a.otf
+third_party/ots/src/tests/fonts/bad/698e25666a75ea6121065b5fced5ccee62b65ca4.otf
+third_party/ots/src/tests/fonts/bad/7c8eefff708b374fffbce135ba28a4565766e560.otf
+third_party/ots/src/tests/fonts/bad/8edb1c6072ff63478456cc93601b77b0eb3432e7.otf
+third_party/ots/src/tests/fonts/bad/927b4dc365aab682749294bc85bd195e4b74e034.otf
+third_party/ots/src/tests/fonts/bad/975a2ba94ea4f520406e1dae2e99bd366b0b66c1.otf
+third_party/ots/src/tests/fonts/bad/b9ea4b9b671307bc0f9745dd684e1e4f6e48191d.otf
+third_party/ots/src/tests/fonts/bad/bd5ee794425c2809f262b4bc6e3c0b33008fca73.otf
+third_party/ots/src/tests/fonts/bad/c69c27b17d332fbf33dbc8f25baa0a0a461293a2.otf
+third_party/ots/src/tests/fonts/bad/c6c0f06e6819b04a2eacca8e20dc0882a21bc312.otf
+third_party/ots/src/tests/fonts/bad/ca0e0bca764d78f46d533b11bb66466f5b489220.otf
+third_party/ots/src/tests/fonts/bad/d052cc5e62def2facb5772d1b38112779539ef0a.otf
+third_party/ots/src/tests/fonts/bad/dcc4f3316f90bc8a4c05e0086d2b49fddd3a059b.otf
+third_party/ots/src/tests/fonts/bad/ea8c4b1d5178ae184ffd0346f12fd426850729cc.otf
+third_party/ots/src/tests/fonts/bad/eaeb6d903b14ee184f887aa8a0a81b917e252da9.otf
+third_party/ots/src/tests/fonts/bad/edaf09c932e0582b1473384f66d5571da752a4d2.otf
+third_party/ots/src/tests/fonts/fuzzing/10531f9105aa03bf6e0f9754ec8af33ed457ad5c.otf
+third_party/ots/src/tests/fonts/fuzzing/205edd09bd3d141cc9580f650109556cc28b22cb.otf
+third_party/ots/src/tests/fonts/fuzzing/2a12de12323bfd99b9c4bb33ed20b66b8ff0915f.otf
+third_party/ots/src/tests/fonts/fuzzing/43979b90b2dd929723cf4fe1715990bcb9c9a56b.otf
+third_party/ots/src/tests/fonts/fuzzing/4765a8901e377d1e767f67e1cc768ae3c9207bd1.ttc
+third_party/ots/src/tests/fonts/fuzzing/757ebd573617a24aa9dfbf0b885c54875c6fe06b.otf
+third_party/ots/src/tests/fonts/fuzzing/7e14e7883ed152baa158b80e207b66114c823a8b.otf
+third_party/ots/src/tests/fonts/fuzzing/8240789f6d12d4cfc4b5e8e6f246c3701bcf861f.otf
+third_party/ots/src/tests/fonts/fuzzing/8668cff491460e4c5cd03142b87e9710fd4b5588.otf
+third_party/ots/src/tests/fonts/fuzzing/94895e7495f726fa316ca3f2a03c98b86dc20560.ttc
+third_party/ots/src/tests/fonts/fuzzing/94bdbcb520c5301750167dc433803ac7933da028.otf
+third_party/ots/src/tests/fonts/fuzzing/b9e2aaa0d75fcef6971ec3a96d806ba4a6b31fe2.otf
+third_party/ots/src/tests/fonts/fuzzing/d69ecb7001e46df61c33e2ec74fdcdd32e018db3.ttc
+third_party/ots/src/tests/fonts/good/27f2cd91ff43713d977b2b253e82b8fcb781e674.otf
+third_party/ots/src/tests/fonts/good/2eba8164a0811c8422ecde8900bf476bb4a05ca3.otf
+third_party/ots/src/tests/fonts/good/4c471c403831e131c7887e9e0b9a547495749579.otf
+third_party/ots/src/tests/fonts/good/84df123947f7f5f9a5456e755f91bef963b1dd7c.otf
+third_party/ots/src/tests/fonts/good/89166e0ffdfdac0309d31012d1d5c1de8fe65a52.otf
+third_party/ots/src/tests/fonts/good/9780d8ca01f53d2f413b9d0403c0412b1f5bbd06.otf
+third_party/ots/src/tests/fonts/good/a64a622a50d6400592a9590c003afb02e9e4436d.otf
+third_party/ots/src/tests/fonts/good/a69c0298f6d3e29903a492ce1f175932dabf800e.otf
+third_party/ots/src/tests/fonts/good/c3886b3124a97b9b9212c426c50366773e9ef10c.otf
+third_party/ots/src/tests/fonts/good/c8af7209f1c5c9a2e541214c9bc31bb2bb676c0e.otf
+third_party/ots/src/tests/fonts/good/e1d157dc9799a686992e5f6c150949fcf3d20ce0.otf
 third_party/pdfium/testing/resources/bug_1469.jp2
 third_party/pdfium/testing/resources/bug_552046.in
 third_party/pdfium/testing/resources/bug_861842.in
@@ -17239,6 +17462,7 @@ third_party/pyelftools/test/testfiles_for_unittests/simple_gcc.elf.arm
 third_party/pywebsocket3/src/test/cert/client_cert.p12
 third_party/quic_trace/src/examples/example.json.gz
 third_party/quic_trace/src/examples/example.qtr
+third_party/r8/custom_d8.jar
 third_party/skia/experimental/wasm-skp-debugger/debugger/anim.mskp
 third_party/skia/experimental/wasm-skp-debugger/debugger/sample.skp
 third_party/skia/modules/canvaskit/tests/assets/Roboto-Regular.otf
@@ -17336,6 +17560,17 @@ third_party/swiftshader/tests/regres/llvm/10.0.0-darwin.sig
 third_party/swiftshader/tests/regres/llvm/10.0.0-ubuntu.sig
 third_party/swiftshader/tests/regres/llvm/10.0.0-win64.sig
 third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/simple.spv
+third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/saved_model.pb
+third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/tfhub_module.pb
+third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.data-00000-of-00001
+third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.index
+third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/test_oss_model.model
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/sentencepiece/testdata/sentencepiece.model
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_flex_delegate.tflite
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_ragged_1d_input.tflite
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_ragged_2d_input.tflite
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_tensor.tflite
+third_party/tflite-support/src/tensorflow_lite_support/custom_ops/testdata/sentencepiece_tokenizer_flex_op.tflite
 third_party/tflite/src/tensorflow/c/testdata/tf_record
 third_party/tflite/src/tensorflow/cc/saved_model/testdata/CyclicModule/debug/saved_model_debug_info.pb
 third_party/tflite/src/tensorflow/cc/saved_model/testdata/CyclicModule/saved_model.pb
@@ -17852,7 +18087,6 @@ third_party/vulkan_memory_allocator/bin/VmaReplay_Release_vs2017.exe
 third_party/vulkan_memory_allocator/bin/VulkanSample_Release_vs2017.exe
 third_party/vulkan_memory_allocator/premake/premake5.exe
 third_party/wayland/src/cursor/cursor.pcf
-third_party/wds/src/datadumps/information-elements.pcapng
 third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.mp4
 third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.theora.ogv
 third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.webmvp8.webm
@@ -17906,6 +18140,10 @@ third_party/webgl/src/sdk/tests/resources/red-green.mp4
 third_party/webgl/src/sdk/tests/resources/red-green.theora.ogv
 third_party/webgl/src/sdk/tests/resources/red-green.webmvp8.webm
 third_party/webgl/src/sdk/tests/resources/transparent-2frames.webm
+third_party/webgl/src/sdk/tests/resources/video-rotation-0.mp4
+third_party/webgl/src/sdk/tests/resources/video-rotation-180.mp4
+third_party/webgl/src/sdk/tests/resources/video-rotation-270.mp4
+third_party/webgl/src/sdk/tests/resources/video-rotation-90.mp4
 third_party/webgpu-cts/src/deploy_key.enc
 third_party/webrtc/data/audio_processing/android/output_data_fixed.pb
 third_party/webrtc/data/audio_processing/android/output_data_float.pb

Some files were not shown because too many files changed in this diff