Browse Source

Update to Chromium 112.0.5615.49

Blaise 1 year ago
parent
commit
b188ff00d0
59 changed files with 860 additions and 637 deletions
  1. 1 1
      chromium_version.txt
  2. 2 5
      devutils/update_lists.py
  3. 172 139
      domain_substitution.list
  4. 0 1
      flags.gn
  5. 2 16
      patches/core/debian/disable/unrar.patch
  6. 34 46
      patches/core/inox-patchset/0001-fix-building-without-safebrowsing.patch
  7. 1 1
      patches/core/inox-patchset/0003-disable-autofill-download-manager.patch
  8. 1 1
      patches/core/inox-patchset/0005-disable-default-extensions.patch
  9. 1 1
      patches/core/inox-patchset/0021-disable-rlz.patch
  10. 8 8
      patches/core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch
  11. 2 2
      patches/core/iridium-browser/safe_browsing-disable-reporting-of-safebrowsing-over.patch
  12. 2 2
      patches/core/ungoogled-chromium/block-requests.patch
  13. 1 1
      patches/core/ungoogled-chromium/block-trk-and-subdomains.patch
  14. 1 1
      patches/core/ungoogled-chromium/disable-crash-reporter.patch
  15. 0 11
      patches/core/ungoogled-chromium/disable-fonts-googleapis-references.patch
  16. 4 2
      patches/core/ungoogled-chromium/disable-gaia.patch
  17. 46 8
      patches/core/ungoogled-chromium/disable-google-host-detection.patch
  18. 5 5
      patches/core/ungoogled-chromium/disable-privacy-sandbox.patch
  19. 1 1
      patches/core/ungoogled-chromium/disable-signin.patch
  20. 4 3
      patches/core/ungoogled-chromium/disable-webrtc-log-uploader.patch
  21. 7 6
      patches/core/ungoogled-chromium/disable-webstore-urls.patch
  22. 206 115
      patches/core/ungoogled-chromium/fix-building-without-safebrowsing.patch
  23. 209 138
      patches/core/ungoogled-chromium/remove-unused-preferences-fields.patch
  24. 4 2
      patches/core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch
  25. 4 4
      patches/core/ungoogled-chromium/toggle-translation-via-switch.patch
  26. 18 18
      patches/extra/bromite/fingerprinting-flags-client-rects-and-measuretext.patch
  27. 7 7
      patches/extra/bromite/flag-fingerprinting-canvas-image-data-noise.patch
  28. 3 3
      patches/extra/bromite/flag-max-connections-per-host.patch
  29. 4 4
      patches/extra/inox-patchset/0006-modify-default-prefs.patch
  30. 1 1
      patches/extra/inox-patchset/0008-restore-classic-ntp.patch
  31. 1 1
      patches/extra/iridium-browser/browser-disable-profile-auto-import-on-first-run.patch
  32. 1 1
      patches/extra/iridium-browser/prefs-always-prompt-for-download-directory-by-defaul.patch
  33. 1 1
      patches/extra/iridium-browser/updater-disable-auto-update.patch
  34. 8 8
      patches/extra/ungoogled-chromium/add-flag-for-close-confirmation.patch
  35. 1 1
      patches/extra/ungoogled-chromium/add-flag-for-custom-ntp.patch
  36. 3 3
      patches/extra/ungoogled-chromium/add-flag-for-disabling-link-drag.patch
  37. 2 2
      patches/extra/ungoogled-chromium/add-flag-for-incognito-themes.patch
  38. 4 4
      patches/extra/ungoogled-chromium/add-flag-for-omnibox-autocomplete-filtering.patch
  39. 1 1
      patches/extra/ungoogled-chromium/add-flag-for-qr-generator.patch
  40. 3 3
      patches/extra/ungoogled-chromium/add-flag-for-search-engine-collection.patch
  41. 1 1
      patches/extra/ungoogled-chromium/add-flag-for-tab-hover-cards.patch
  42. 1 1
      patches/extra/ungoogled-chromium/add-flag-for-tabsearch-button.patch
  43. 16 16
      patches/extra/ungoogled-chromium/add-flag-to-clear-data-on-exit.patch
  44. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-close-window-with-last-tab.patch
  45. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-configure-extension-downloading.patch
  46. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-convert-popups-to-tabs.patch
  47. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-disable-local-history-expiration.patch
  48. 2 2
      patches/extra/ungoogled-chromium/add-flag-to-hide-extensions-menu.patch
  49. 1 1
      patches/extra/ungoogled-chromium/add-flag-to-hide-fullscreen-exit-ui.patch
  50. 1 1
      patches/extra/ungoogled-chromium/add-ipv6-probing-option.patch
  51. 1 1
      patches/extra/ungoogled-chromium/add-suggestions-url-field.patch
  52. 1 1
      patches/extra/ungoogled-chromium/add-ungoogled-flag-headers.patch
  53. 1 1
      patches/extra/ungoogled-chromium/disable-download-quarantine.patch
  54. 1 1
      patches/extra/ungoogled-chromium/disable-intranet-redirect-detector.patch
  55. 1 1
      patches/extra/ungoogled-chromium/enable-default-prefetch-privacy-changes.patch
  56. 2 2
      patches/extra/ungoogled-chromium/enable-page-saving-on-more-pages.patch
  57. 2 2
      patches/extra/ungoogled-chromium/enable-paste-and-go-new-tab-button.patch
  58. 3 3
      patches/extra/ungoogled-chromium/remove-uneeded-ui.patch
  59. 46 21
      pruning.list

+ 1 - 1
chromium_version.txt

@@ -1 +1 @@
-111.0.5563.147
+112.0.5615.49

+ 2 - 5
devutils/update_lists.py

@@ -41,10 +41,6 @@ PRUNING_INCLUDE_PATTERNS = [
 # pathlib.Path.match() paths to exclude from binary pruning
 PRUNING_EXCLUDE_PATTERNS = [
     'chrome/common/win/eventlog_messages.mc', # TODO: False positive textfile
-    # TabRanker example preprocessor config
-    # Details in chrome/browser/resource_coordinator/tab_ranker/README.md
-    'chrome/browser/resource_coordinator/tab_ranker/example_preprocessor_config.pb',
-    'chrome/browser/resource_coordinator/tab_ranker/pairwise_preprocessor_config.pb',
     # Exclusions for DOM distiller (contains model data only)
     'components/dom_distiller/core/data/distillable_page_model_new.bin',
     'components/dom_distiller/core/data/long_page_model.bin',
@@ -367,7 +363,8 @@ def main(args_list=None):
         dest='error_unused',
         help='Do not treat unused patterns/prefixes as an error.')
     args = parser.parse_args(args_list)
-    DOMAIN_EXCLUDE_PREFIXES.extend(args.domain_exclude_prefix)
+    if args.domain_exclude_prefix is not None:
+        DOMAIN_EXCLUDE_PREFIXES.extend(args.domain_exclude_prefix)
     if args.tree.exists() and not _dir_empty(args.tree):
         get_logger().info('Using existing source tree at %s', args.tree)
     else:

File diff suppressed because it is too large
+ 172 - 139
domain_substitution.list


+ 0 - 1
flags.gn

@@ -3,7 +3,6 @@ chrome_pgo_phase=0
 clang_use_chrome_plugins=false
 disable_fieldtrial_testing_config=true
 enable_hangout_services_extension=false
-enable_js_type_check=false
 enable_mdns=false
 enable_mse_mpeg2ts_stream_parser=true
 enable_nacl=false

+ 2 - 16
patches/core/debian/disable/unrar.patch

@@ -15,7 +15,7 @@ bug: http://bugs.debian.org/914487
      StartExtractDmgFeatures();
 --- a/chrome/common/safe_browsing/BUILD.gn
 +++ b/chrome/common/safe_browsing/BUILD.gn
-@@ -58,39 +58,6 @@ if (safe_browsing_mode == 1) {
+@@ -58,25 +58,6 @@ if (safe_browsing_mode == 1) {
      public_deps = [ "//components/safe_browsing/core/common/proto:csd_proto" ]
    }
  
@@ -35,27 +35,13 @@ bug: http://bugs.debian.org/914487
 -      "//third_party/unrar:unrar",
 -    ]
 -
--    defines = [
--      "_FILE_OFFSET_BITS=64",
--      "LARGEFILE_SOURCE",
--      "RAR_SMP",
--      "SILENT",
--
--      # The following is set to disable certain macro definitions in the unrar
--      # source code.
--      "CHROMIUM_UNRAR",
--
--      # Disables exceptions in unrar, replaces them with process termination.
--      "UNRAR_NO_EXCEPTIONS",
--    ]
--
 -    public_deps = [ "//components/safe_browsing/core/common/proto:csd_proto" ]
 -  }
 -
    if (is_linux || is_win) {
      source_set("document_analyzer") {
        sources = [
-@@ -191,7 +158,6 @@ source_set("safe_browsing") {
+@@ -172,7 +153,6 @@ source_set("safe_browsing") {
        ":archive_analyzer_results",
        ":binary_feature_extractor",
        ":download_type_util",

+ 34 - 46
patches/core/inox-patchset/0001-fix-building-without-safebrowsing.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -2255,7 +2255,6 @@ static_library("browser") {
+@@ -2269,7 +2269,6 @@ static_library("browser") {
      "//components/reporting/util:task_runner_context",
      "//components/resources",
      "//components/safe_browsing/content/browser",
@@ -8,7 +8,7 @@
      "//components/safe_browsing/content/browser:safe_browsing_service",
      "//components/safe_browsing/content/browser/password_protection",
      "//components/safe_browsing/content/browser/web_ui",
-@@ -3616,8 +3615,6 @@ static_library("browser") {
+@@ -3630,8 +3629,6 @@ static_library("browser") {
        "download/download_commands.h",
        "download/download_crx_util.cc",
        "download/download_crx_util.h",
@@ -131,7 +131,7 @@
  #include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
  #include "chrome/browser/search_engines/template_url_service_factory.h"
  #include "chrome/browser/share/share_history.h"
-@@ -633,10 +632,6 @@ void ChromeBrowsingDataRemoverDelegate::
+@@ -634,10 +633,6 @@ void ChromeBrowsingDataRemoverDelegate::
      base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
  
      network::mojom::NetworkContext* safe_browsing_context = nullptr;
@@ -144,7 +144,7 @@
      browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -1046,34 +1046,6 @@ void SetApplicationLocaleOnIOThread(cons
+@@ -1058,34 +1058,6 @@ void SetApplicationLocaleOnIOThread(cons
    GetIOThreadApplicationLocale() = locale;
  }
  
@@ -179,7 +179,7 @@
  #if BUILDFLAG(ENABLE_EXTENSIONS)
  
  AppLoadedInTabSource ClassifyAppLoadedInTabSource(
-@@ -4944,14 +4916,9 @@ ChromeContentBrowserClient::CreateThrott
+@@ -4977,14 +4949,9 @@ ChromeContentBrowserClient::CreateThrott
    throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
        handle, handle->GetWebContents()->GetBrowserContext()));
  
@@ -195,7 +195,7 @@
        base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
        base::BindOnce(
            &ShouldIgnoreSslInterstitialBecauseNavigationDefaultedToHttps)));
-@@ -4994,16 +4961,6 @@ ChromeContentBrowserClient::CreateThrott
+@@ -5027,16 +4994,6 @@ ChromeContentBrowserClient::CreateThrott
        &throttles);
  #endif
  
@@ -212,7 +212,7 @@
    if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
      throttles.push_back(
          std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
-@@ -5265,8 +5222,6 @@ void ChromeContentBrowserClient::Overrid
+@@ -5312,8 +5269,6 @@ void ChromeContentBrowserClient::Overrid
  void ChromeContentBrowserClient::InitOnUIThread() {
    DCHECK_CURRENTLY_ON(BrowserThread::UI);
  
@@ -246,7 +246,7 @@
  }  // namespace
 --- a/chrome/browser/download/chrome_download_manager_delegate.cc
 +++ b/chrome/browser/download/chrome_download_manager_delegate.cc
-@@ -455,13 +455,6 @@ void ChromeDownloadManagerDelegate::SetD
+@@ -461,13 +461,6 @@ void ChromeDownloadManagerDelegate::SetD
  
    download_manager_ = dm;
  
@@ -260,7 +260,7 @@
    if (download_manager_) {
      download_manager_->AddObserver(this);
    }
-@@ -826,17 +819,6 @@ void ChromeDownloadManagerDelegate::Choo
+@@ -832,17 +825,6 @@ void ChromeDownloadManagerDelegate::Choo
  void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
      base::FilePath* filename,
      const GURL& source_url) {
@@ -280,7 +280,7 @@
  void ChromeDownloadManagerDelegate::SanitizeDownloadParameters(
 --- a/chrome/browser/download/download_item_model.cc
 +++ b/chrome/browser/download/download_item_model.cc
-@@ -106,7 +106,7 @@ class DownloadItemModelData : public bas
+@@ -110,7 +110,7 @@ class DownloadItemModelData : public bas
  
    // Danger level of the file determined based on the file type and whether
    // there was a user action associated with the download.
@@ -289,7 +289,7 @@
  
    // Whether the download is currently being revived.
    bool is_being_revived_;
-@@ -154,7 +154,7 @@ DownloadItemModelData* DownloadItemModel
+@@ -160,7 +160,7 @@ DownloadItemModelData* DownloadItemModel
  DownloadItemModelData::DownloadItemModelData()
      : should_show_in_shelf_(true),
        was_ui_notified_(false),
@@ -298,7 +298,7 @@
        is_being_revived_(false) {}
  
  #if BUILDFLAG(FULL_SAFE_BROWSING)
-@@ -534,13 +534,13 @@ void DownloadItemModel::SetShouldPreferO
+@@ -543,13 +543,13 @@ void DownloadItemModel::SetShouldPreferO
    data->should_prefer_opening_in_browser_ = preference;
  }
  
@@ -315,7 +315,7 @@
    DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
    data->danger_level_ = danger_level;
  }
-@@ -719,9 +719,6 @@ bool DownloadItemModel::IsCommandEnabled
+@@ -728,9 +728,6 @@ bool DownloadItemModel::IsCommandEnabled
        // filename. Don't base an "Always open" decision based on it. Also
        // exclude extensions.
        return download_->CanOpenDownload() &&
@@ -327,7 +327,7 @@
        return !download_->IsSavePackageDownload() &&
 --- a/chrome/browser/download/download_prefs.cc
 +++ b/chrome/browser/download/download_prefs.cc
-@@ -263,14 +263,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
+@@ -268,14 +268,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
          base::FilePath::StringType(1, base::FilePath::kExtensionSeparator) +
          extension);
  
@@ -343,7 +343,7 @@
    }
  }
  
-@@ -450,10 +443,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
+@@ -460,10 +453,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
  bool DownloadPrefs::EnableAutoOpenByUserBasedOnExtension(
      const base::FilePath& file_name) {
    base::FilePath::StringType extension = file_name.Extension();
@@ -370,7 +370,7 @@
    // If no mime type or explicitly specified a name, don't replace file
    // extension.
    if (sniffed_mime_type.empty() || !suggested_filename.empty())
-@@ -1268,30 +1261,7 @@ DownloadFileType::DangerLevel DownloadTa
+@@ -1274,30 +1267,7 @@ DownloadFileType::DangerLevel DownloadTa
        download_->HasUserGesture())
      return DownloadFileType::NOT_DANGEROUS;
  
@@ -404,7 +404,7 @@
  absl::optional<base::Time>
 --- a/chrome/browser/extensions/api/downloads/downloads_api.cc
 +++ b/chrome/browser/extensions/api/downloads/downloads_api.cc
-@@ -36,7 +36,6 @@
+@@ -37,7 +37,6 @@
  #include "chrome/browser/download/bubble/download_bubble_prefs.h"
  #include "chrome/browser/download/download_core_service.h"
  #include "chrome/browser/download/download_core_service_factory.h"
@@ -412,7 +412,7 @@
  #include "chrome/browser/download/download_file_icon_extractor.h"
  #include "chrome/browser/download/download_open_prompt.h"
  #include "chrome/browser/download/download_prefs.h"
-@@ -1360,9 +1359,6 @@ DownloadsAcceptDangerFunction::Downloads
+@@ -1361,9 +1360,6 @@ DownloadsAcceptDangerFunction::Downloads
  
  DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
  
@@ -422,7 +422,7 @@
  ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
    std::unique_ptr<downloads::AcceptDanger::Params> params(
        downloads::AcceptDanger::Params::Create(args()));
-@@ -1400,42 +1396,7 @@ void DownloadsAcceptDangerFunction::Prom
+@@ -1401,42 +1397,7 @@ void DownloadsAcceptDangerFunction::Prom
      return;
    }
    RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
@@ -548,7 +548,7 @@
            referrer_entries)));
 --- a/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
 +++ b/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
-@@ -720,18 +720,6 @@ void WebstorePrivateBeginInstallWithMani
+@@ -721,18 +721,6 @@ void WebstorePrivateBeginInstallWithMani
  
  void WebstorePrivateBeginInstallWithManifest3Function::
      ReportFrictionAcceptedEvent() {
@@ -567,7 +567,7 @@
  }
  
  void WebstorePrivateBeginInstallWithManifest3Function::OnInstallPromptDone(
-@@ -1217,55 +1205,9 @@ WebstorePrivateGetReferrerChainFunction:
+@@ -1218,55 +1206,9 @@ WebstorePrivateGetReferrerChainFunction:
  
  ExtensionFunction::ResponseAction
  WebstorePrivateGetReferrerChainFunction::Run() {
@@ -694,21 +694,9 @@
    scoped_refptr<network::SharedURLLoaderFactory> url_loader_factory_;
  
    // SimpleURLLoader -> (owned loader, extension id).
---- a/chrome/browser/metrics/chrome_metrics_service_client.cc
-+++ b/chrome/browser/metrics/chrome_metrics_service_client.cc
-@@ -902,9 +902,6 @@ void ChromeMetricsServiceClient::Registe
-   metrics_service_->RegisterMetricsProvider(
-       std::make_unique<HttpsEngagementMetricsProvider>());
- 
--  metrics_service_->RegisterMetricsProvider(
--      std::make_unique<CertificateReportingMetricsProvider>());
--
- #if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS_ASH)
-   metrics_service_->RegisterMetricsProvider(
-       std::make_unique<UpgradeMetricsProvider>());
 --- a/chrome/browser/net/trial_comparison_cert_verifier_controller.cc
 +++ b/chrome/browser/net/trial_comparison_cert_verifier_controller.cc
-@@ -132,9 +132,6 @@ void TrialComparisonCertVerifierControll
+@@ -137,9 +137,6 @@ void TrialComparisonCertVerifierControll
    std::string serialized_report;
    if (!report.Serialize(&serialized_report))
      return;
@@ -728,7 +716,7 @@
  #include "chrome/browser/sessions/exit_type_service.h"
  #include "chrome/browser/sharing/sharing_service_factory.h"
  #include "chrome/browser/signin/identity_manager_factory.h"
-@@ -628,17 +627,6 @@ void ProfileImpl::LoadPrefsForNormalStar
+@@ -632,17 +631,6 @@ void ProfileImpl::LoadPrefsForNormalStar
  
    mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
        pref_validation_delegate;
@@ -768,7 +756,7 @@
    sources = [
      "chrome_controller_client.cc",
      "chrome_controller_client.h",
-@@ -94,6 +95,7 @@ static_library("safe_browsing") {
+@@ -96,6 +97,7 @@ static_library("safe_browsing") {
        "//extensions/browser",
      ]
    }
@@ -776,7 +764,7 @@
  
    if (safe_browsing_mode != 0) {
      # "Safe Browsing Basic" files used for safe browsing in full mode
-@@ -484,6 +486,7 @@ static_library("advanced_protection") {
+@@ -489,6 +491,7 @@ static_library("advanced_protection") {
  }
  
  source_set("metrics_collector") {
@@ -784,7 +772,7 @@
    sources = [
      "safe_browsing_metrics_collector_factory.cc",
      "safe_browsing_metrics_collector_factory.h",
-@@ -501,6 +504,7 @@ source_set("metrics_collector") {
+@@ -508,6 +511,7 @@ source_set("metrics_collector") {
      "//components/safe_browsing/core/common:safe_browsing_prefs",
      "//content/public/browser",
    ]
@@ -794,7 +782,7 @@
  source_set("test_support") {
 --- a/chrome/browser/ssl/security_state_tab_helper.cc
 +++ b/chrome/browser/ssl/security_state_tab_helper.cc
-@@ -168,92 +168,6 @@ bool SecurityStateTabHelper::UsedPolicyI
+@@ -174,92 +174,6 @@ bool SecurityStateTabHelper::UsedPolicyI
  
  security_state::MaliciousContentStatus
  SecurityStateTabHelper::GetMaliciousContentStatus() const {
@@ -889,7 +877,7 @@
  
 --- a/chrome/browser/ui/BUILD.gn
 +++ b/chrome/browser/ui/BUILD.gn
-@@ -4495,7 +4495,6 @@ static_library("ui") {
+@@ -4540,7 +4540,6 @@ static_library("ui") {
        "views/download/bubble/download_dialog_view.h",
        "views/download/bubble/download_toolbar_button_view.cc",
        "views/download/bubble/download_toolbar_button_view.h",
@@ -1035,7 +1023,7 @@
    bool IsDeletingHistoryAllowed();
 --- a/chrome/browser/ui/webui/interstitials/interstitial_ui.cc
 +++ b/chrome/browser/ui/webui/interstitials/interstitial_ui.cc
-@@ -277,65 +277,6 @@ CreateHttpsOnlyModePage(content::WebCont
+@@ -278,65 +278,6 @@ CreateHttpsOnlyModePage(content::WebCont
                                                        request_url));
  }
  
@@ -1101,7 +1089,7 @@
  std::unique_ptr<EnterpriseBlockPage> CreateEnterpriseBlockPage(
      content::WebContents* web_contents) {
    const GURL kRequestUrl("https://enterprise-block.example.net");
-@@ -345,88 +286,6 @@ std::unique_ptr<EnterpriseBlockPage> Cre
+@@ -346,88 +287,6 @@ std::unique_ptr<EnterpriseBlockPage> Cre
                                                          kRequestUrl));
  }
  
@@ -1190,7 +1178,7 @@
  #if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
  std::unique_ptr<CaptivePortalBlockingPage> CreateCaptivePortalBlockingPage(
      content::WebContents* web_contents) {
-@@ -533,12 +392,8 @@ void InterstitialHTMLSource::StartDataRe
+@@ -534,12 +393,8 @@ void InterstitialHTMLSource::StartDataRe
      interstitial_delegate = CreateMITMSoftwareBlockingPage(web_contents);
    } else if (path_without_query == "/blocked-interception") {
      interstitial_delegate = CreateBlockedInterceptionBlockingPage(web_contents);
@@ -1203,7 +1191,7 @@
    } else if (path_without_query == "/clock") {
      interstitial_delegate = CreateBadClockBlockingPage(web_contents);
    } else if (path_without_query == "/lookalike") {
-@@ -553,16 +408,12 @@ void InterstitialHTMLSource::StartDataRe
+@@ -554,16 +409,12 @@ void InterstitialHTMLSource::StartDataRe
      interstitial_delegate = CreateHttpsOnlyModePage(web_contents);
    }
  
@@ -1225,7 +1213,7 @@
      html = ui::ResourceBundle::GetSharedInstance().LoadDataResourceString(
 --- a/chrome/renderer/chrome_content_renderer_client.cc
 +++ b/chrome/renderer/chrome_content_renderer_client.cc
-@@ -98,7 +98,6 @@
+@@ -97,7 +97,6 @@
  #include "components/paint_preview/buildflags/buildflags.h"
  #include "components/password_manager/core/common/password_manager_features.h"
  #include "components/safe_browsing/buildflags.h"
@@ -1233,7 +1221,7 @@
  #include "components/spellcheck/spellcheck_buildflags.h"
  #include "components/subresource_filter/content/renderer/subresource_filter_agent.h"
  #include "components/subresource_filter/content/renderer/unverified_ruleset_dealer.h"
-@@ -429,12 +428,8 @@ void ChromeContentRendererClient::Render
+@@ -433,12 +432,8 @@ void ChromeContentRendererClient::Render
    subresource_filter_ruleset_dealer_ =
        std::make_unique<subresource_filter::UnverifiedRulesetDealer>();
  

+ 1 - 1
patches/core/inox-patchset/0003-disable-autofill-download-manager.patch

@@ -1,6 +1,6 @@
 --- a/components/autofill/core/browser/autofill_download_manager.cc
 +++ b/components/autofill/core/browser/autofill_download_manager.cc
-@@ -805,95 +805,6 @@ std::tuple<GURL, std::string> AutofillDo
+@@ -792,95 +792,6 @@ std::tuple<GURL, std::string> AutofillDo
  }
  
  bool AutofillDownloadManager::StartRequest(FormRequestData request_data) {

+ 1 - 1
patches/core/inox-patchset/0005-disable-default-extensions.patch

@@ -10,7 +10,7 @@
      extension_misc::kAssessmentAssistantExtensionId,
 --- a/chrome/browser/extensions/component_loader.cc
 +++ b/chrome/browser/extensions/component_loader.cc
-@@ -361,11 +361,6 @@ void ComponentLoader::AddWebStoreApp() {
+@@ -376,11 +376,6 @@ void ComponentLoader::AddWebStoreApp() {
    if (!IsNormalSession())
      return;
  #endif

+ 1 - 1
patches/core/inox-patchset/0021-disable-rlz.patch

@@ -2,7 +2,7 @@
 
 --- a/BUILD.gn
 +++ b/BUILD.gn
-@@ -453,14 +453,6 @@ group("gn_all") {
+@@ -459,14 +459,6 @@ group("gn_all") {
      deps += [ "//chromeos:chromeos_unittests" ]
    }
  

+ 8 - 8
patches/core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch

@@ -123,7 +123,7 @@ by default.
      scoped_refptr<base::SequencedTaskRunner> task_runner)
 --- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
 +++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
-@@ -484,7 +484,7 @@ void WebRtcLogUploader::UploadCompressed
+@@ -485,7 +485,7 @@ void WebRtcLogUploader::UploadCompressed
              "Not implemented, it would be good to do so."
          })");
  
@@ -178,7 +178,7 @@ by default.
  DownloadFeedbackFactory* DownloadFeedback::factory_ = nullptr;
 --- a/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
 +++ b/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
-@@ -277,7 +277,7 @@ GURL SpellcheckHunspellDictionary::GetDi
+@@ -274,7 +274,7 @@ GURL SpellcheckHunspellDictionary::GetDi
    DCHECK(!bdict_file.empty());
  
    static const char kDownloadServerUrl[] =
@@ -189,14 +189,14 @@ by default.
                base::ToLowerASCII(bdict_file));
 --- a/chrome/browser/supervised_user/supervised_user_service.cc
 +++ b/chrome/browser/supervised_user/supervised_user_service.cc
-@@ -87,7 +87,7 @@ namespace {
+@@ -86,7 +86,7 @@ namespace {
  
  // The URL from which to download a host denylist if no local one exists yet.
  const char kDenylistURL[] =
 -    "https://www.gstatic.com/chrome/supervised_user/denylist-20141001-1k.bin";
 +    "trk:272:https://www.gstatic.com/chrome/supervised_user/denylist-20141001-1k.bin";
- // The filename under which we'll store the denylist (in the user data dir).
- const char kDenylistFilename[] = "su-denylist.bin";
+ 
+ const char kDenylistSourceHistogramName[] = "FamilyUser.DenylistSource";
  
 --- a/chrome/browser/ui/dialogs/outdated_upgrade_bubble.cc
 +++ b/chrome/browser/ui/dialogs/outdated_upgrade_bubble.cc
@@ -271,7 +271,7 @@ by default.
  
 --- a/chrome/installer/setup/google_chrome_behaviors.cc
 +++ b/chrome/installer/setup/google_chrome_behaviors.cc
-@@ -37,7 +37,7 @@ namespace installer {
+@@ -36,7 +36,7 @@ namespace installer {
  namespace {
  
  constexpr base::WStringPiece kUninstallSurveyUrl(
@@ -370,7 +370,7 @@ by default.
      "http://clientservices.googleapis.com/uma/v2";
 --- a/components/safe_browsing/content/browser/client_side_detection_service.cc
 +++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
-@@ -63,7 +63,7 @@ const int ClientSideDetectionService::kN
+@@ -71,7 +71,7 @@ const int ClientSideDetectionService::kN
  const int ClientSideDetectionService::kPositiveCacheIntervalMinutes = 30;
  
  const char ClientSideDetectionService::kClientReportPhishingUrl[] =
@@ -460,7 +460,7 @@ by default.
    WebAuthRequestSecurityChecker(const WebAuthRequestSecurityChecker&) = delete;
 --- a/content/shell/browser/shell_browser_main_parts.cc
 +++ b/content/shell/browser/shell_browser_main_parts.cc
-@@ -85,7 +85,7 @@ GURL GetStartupURL() {
+@@ -87,7 +87,7 @@ GURL GetStartupURL() {
  #else
    const base::CommandLine::StringVector& args = command_line->GetArgs();
    if (args.empty())

+ 2 - 2
patches/core/iridium-browser/safe_browsing-disable-reporting-of-safebrowsing-over.patch

@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
 
 --- a/components/safe_browsing/content/browser/client_side_detection_service.cc
 +++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
-@@ -207,6 +207,10 @@ void ClientSideDetectionService::StartCl
+@@ -237,6 +237,10 @@ void ClientSideDetectionService::StartCl
      return;
    }
  
@@ -24,7 +24,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
    std::string request_data;
    request->SerializeToString(&request_data);
  
-@@ -281,6 +285,7 @@ void ClientSideDetectionService::StartCl
+@@ -311,6 +315,7 @@ void ClientSideDetectionService::StartCl
        base::BindOnce(&WebUIInfoSingleton::AddToClientPhishingRequestsSent,
                       base::Unretained(WebUIInfoSingleton::GetInstance()),
                       std::move(request), access_token));

+ 2 - 2
patches/core/ungoogled-chromium/block-requests.patch

@@ -45,7 +45,7 @@
    collection_error_info_.ClearError();
 --- a/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
 +++ b/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
-@@ -284,6 +284,7 @@ GURL SpellcheckHunspellDictionary::GetDi
+@@ -281,6 +281,7 @@ GURL SpellcheckHunspellDictionary::GetDi
  }
  
  void SpellcheckHunspellDictionary::DownloadDictionary(GURL url) {
@@ -70,6 +70,6 @@
      const base::flat_map<std::string, std::string>& additional_attributes,
      UpdateCheckCallback update_check_callback) {
 +  return;
-   DCHECK(thread_checker_.CalledOnValidThread());
+   DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
  
    update_check_callback_ = std::move(update_check_callback);

+ 1 - 1
patches/core/ungoogled-chromium/block-trk-and-subdomains.patch

@@ -70,7 +70,7 @@
    // other origins, so we should not treat them as web safe. Remove callers of
 --- a/net/BUILD.gn
 +++ b/net/BUILD.gn
-@@ -1023,6 +1023,8 @@ component("net") {
+@@ -1026,6 +1026,8 @@ component("net") {
      "url_request/report_sender.h",
      "url_request/static_http_user_agent_settings.cc",
      "url_request/static_http_user_agent_settings.h",

+ 1 - 1
patches/core/ungoogled-chromium/disable-crash-reporter.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -2547,7 +2547,8 @@ void ChromeContentBrowserClient::AppendE
+@@ -2545,7 +2545,8 @@ void ChromeContentBrowserClient::AppendE
      command_line->AppendSwitchASCII(switches::kMetricsClientID,
                                      client_info->client_id);
    }

+ 0 - 11
patches/core/ungoogled-chromium/disable-fonts-googleapis-references.patch

@@ -1,16 +1,5 @@
 # Disables references to fonts.googleapis.com
 
---- a/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
-+++ b/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
-@@ -2,7 +2,7 @@
-  * Use of this source code is governed by a BSD-style license that can be
-  * found in the LICENSE file. */
- 
--@import url(https://fonts.googleapis.com/css?family=Roboto);
-+@import url(chrome://resources/css/roboto.css);
- 
- body {
-     margin: 0 0 20px 0;
 --- a/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
 +++ b/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
 @@ -2,7 +2,7 @@

+ 4 - 2
patches/core/ungoogled-chromium/disable-gaia.patch

@@ -3,7 +3,7 @@
 
 --- a/google_apis/gaia/gaia_auth_fetcher.cc
 +++ b/google_apis/gaia/gaia_auth_fetcher.cc
-@@ -261,59 +261,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
+@@ -262,61 +262,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
      network::mojom::CredentialsMode credentials_mode,
      const net::NetworkTrafficAnnotationTag& traffic_annotation) {
    DCHECK(!fetch_pending_) << "Tried to fetch two things at once!";
@@ -12,7 +12,9 @@
 -  resource_request->url = gaia_gurl;
 -  original_url_ = gaia_gurl;
 -
--  if (credentials_mode != network::mojom::CredentialsMode::kOmit) {
+-  if (credentials_mode != network::mojom::CredentialsMode::kOmit &&
+-      credentials_mode !=
+-          network::mojom::CredentialsMode::kOmitBug_775438_Workaround) {
 -    CHECK(gaia::HasGaiaSchemeHostPort(gaia_gurl)) << gaia_gurl;
 -
 -    url::Origin origin = GaiaUrls::GetInstance()->gaia_origin();

+ 46 - 8
patches/core/ungoogled-chromium/disable-google-host-detection.patch

@@ -1,5 +1,17 @@
 # Disables various detections of Google hosts and functionality specific to them
 
+--- a/chrome/browser/ui/webui/suggest_internals/suggest_internals_handler.cc
++++ b/chrome/browser/ui/webui/suggest_internals/suggest_internals_handler.cc
+@@ -55,9 +55,6 @@ void SuggestInternalsHandler::OnSuggestR
+       suggest_internals::mojom::Request::New();
+   mojom_request->id = request_id;
+   mojom_request->url = request->url;
+-  std::string variations_header;
+-  variations::GetVariationsHeader(*request, &variations_header);
+-  mojom_request->data[variations::kClientDataHeader] = variations_header;
+   mojom_request->data[request->method] = request->url.spec();
+   mojom_request->status = suggest_internals::mojom::RequestStatus::kSent;
+   mojom_request->start_time = base::Time::Now();
 --- a/chrome/common/google_url_loader_throttle.cc
 +++ b/chrome/common/google_url_loader_throttle.cc
 @@ -15,10 +15,6 @@
@@ -470,7 +482,7 @@
  bool IsGoogleHostname(const GURL& url) {
 --- a/components/search_engines/template_url.cc
 +++ b/components/search_engines/template_url.cc
-@@ -536,11 +536,7 @@ std::u16string TemplateURLRef::SearchTer
+@@ -556,11 +556,7 @@ std::u16string TemplateURLRef::SearchTer
  bool TemplateURLRef::HasGoogleBaseURLs(
      const SearchTermsData& search_terms_data) const {
    ParseIfNecessary(search_terms_data);
@@ -496,7 +508,24 @@
  namespace {
  
  // The result of checking whether a request to a URL should have variations
-@@ -250,30 +246,7 @@ class VariationsHeaderHelper {
+@@ -114,16 +110,6 @@ URLValidationResult GetUrlValidationResu
+   return URLValidationResult::kShouldAppend;
+ }
+ 
+-// Returns true if the request to |url| should include a variations header.
+-// Also, logs the result of validating |url| in histograms, one of which ends in
+-// |suffix|.
+-bool ShouldAppendVariationsHeader(const GURL& url, const std::string& suffix) {
+-  URLValidationResult result = GetUrlValidationResult(url);
+-  base::UmaHistogramEnumeration(
+-      "Variations.Headers.URLValidationResult." + suffix, result);
+-  return result == URLValidationResult::kShouldAppend;
+-}
+-
+ // Returns true if the request is sent from a Google web property, i.e. from a
+ // first-party context.
+ //
+@@ -250,30 +236,7 @@ class VariationsHeaderHelper {
    VariationsHeaderHelper& operator=(const VariationsHeaderHelper&) = delete;
  
    bool AppendHeaderIfNeeded(const GURL& url, InIncognito incognito) {
@@ -528,7 +557,7 @@
    }
  
   private:
-@@ -338,8 +311,6 @@ void RemoveVariationsHeaderIfNeeded(
+@@ -338,8 +301,6 @@ void RemoveVariationsHeaderIfNeeded(
      const net::RedirectInfo& redirect_info,
      const network::mojom::URLResponseHead& response_head,
      std::vector<std::string>* to_be_removed_headers) {
@@ -537,18 +566,27 @@
  }
  
  std::unique_ptr<network::SimpleURLLoader>
-@@ -369,9 +340,7 @@ CreateSimpleURLLoaderWithVariationsHeade
+@@ -375,29 +336,22 @@ CreateSimpleURLLoaderWithVariationsHeade
  }
  
  bool HasVariationsHeader(const network::ResourceRequest& request) {
--  // Note: kOmniboxOnDeviceSuggestionsHeader is not listed because this function
--  // is only used for testing.
--  return request.cors_exempt_headers.HasHeader(kClientDataHeader);
+-  std::string unused_header;
+-  return GetVariationsHeader(request, &unused_header);
++  return false;
+ }
+ 
+ bool GetVariationsHeader(const network::ResourceRequest& request,
+                          std::string* out) {
+-  return request.cors_exempt_headers.GetHeader(kClientDataHeader, out);
 +  return false;
  }
  
  bool ShouldAppendVariationsHeaderForTesting(
-@@ -382,12 +351,6 @@ bool ShouldAppendVariationsHeaderForTest
+     const GURL& url,
+     const std::string& histogram_suffix) {
+-  return ShouldAppendVariationsHeader(url, histogram_suffix);
++  return false;
+ }
  
  void UpdateCorsExemptHeaderForVariations(
      network::mojom::NetworkContextParams* params) {

+ 5 - 5
patches/core/ungoogled-chromium/disable-privacy-sandbox.patch

@@ -29,7 +29,7 @@
  }  // namespace
 --- a/components/privacy_sandbox/privacy_sandbox_prefs.cc
 +++ b/components/privacy_sandbox/privacy_sandbox_prefs.cc
-@@ -98,7 +98,7 @@ namespace privacy_sandbox {
+@@ -101,7 +101,7 @@ namespace privacy_sandbox {
  
  void RegisterProfilePrefs(PrefRegistrySimple* registry) {
    registry->RegisterBooleanPref(
@@ -49,7 +49,7 @@
  }
  
  PrivacySandboxSettingsImpl::PrivacySandboxSettingsImpl(
-@@ -470,20 +470,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
+@@ -465,20 +465,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
  }
  
  bool PrivacySandboxSettingsImpl::IsPrivacySandboxEnabled() const {
@@ -71,14 +71,14 @@
  }
  
  void PrivacySandboxSettingsImpl::SetAllPrivacySandboxAllowedForTesting() {
-@@ -508,7 +495,6 @@ void PrivacySandboxSettingsImpl::SetTopi
+@@ -503,7 +490,6 @@ void PrivacySandboxSettingsImpl::SetTopi
  }
  
  void PrivacySandboxSettingsImpl::SetPrivacySandboxEnabled(bool enabled) {
 -  pref_service_->SetBoolean(prefs::kPrivacySandboxApisEnabledV2, enabled);
  }
  
- bool PrivacySandboxSettingsImpl::IsTrustTokensAllowed() {
+ bool PrivacySandboxSettingsImpl::IsPrivacySandboxRestricted() const {
 --- a/content/browser/aggregation_service/aggregation_service_features.cc
 +++ b/content/browser/aggregation_service/aggregation_service_features.cc
 @@ -9,7 +9,7 @@ namespace content {
@@ -92,7 +92,7 @@
      kPrivacySandboxAggregationServiceTrustedServerUrlAwsParam{
 --- a/third_party/blink/common/features.cc
 +++ b/third_party/blink/common/features.cc
-@@ -122,7 +122,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
+@@ -129,7 +129,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
  // Controls whether the Conversion Measurement API infrastructure is enabled.
  BASE_FEATURE(kConversionMeasurement,
               "ConversionMeasurement",

+ 1 - 1
patches/core/ungoogled-chromium/disable-signin.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/ui/chrome_pages.cc
 +++ b/chrome/browser/ui/chrome_pages.cc
-@@ -600,32 +600,6 @@ void ShowShortcutCustomizationApp(Profil
+@@ -610,32 +610,6 @@ void ShowShortcutCustomizationApp(Profil
  void ShowBrowserSignin(Browser* browser,
                         signin_metrics::AccessPoint access_point,
                         signin::ConsentLevel consent_level) {

+ 4 - 3
patches/core/ungoogled-chromium/disable-webrtc-log-uploader.patch

@@ -62,7 +62,7 @@
  }
  
  void WebRtcLogUploader::UploadStoredLog(
-@@ -245,49 +207,6 @@ void WebRtcLogUploader::LoggingStoppedDo
+@@ -245,50 +207,6 @@ void WebRtcLogUploader::LoggingStoppedDo
    DCHECK(log_buffer.get());
    DCHECK(!log_paths.directory.empty());
  
@@ -105,8 +105,9 @@
 -    base::FilePath meta_path =
 -        log_paths.directory.AppendASCII(log_id).AddExtension(
 -            FILE_PATH_LITERAL(".meta"));
--    base::WriteFile(meta_path, static_cast<const char*>(pickle.data()),
--                    pickle.size());
+-    base::WriteFile(meta_path,
+-                    base::make_span(static_cast<const uint8_t*>(pickle.data()),
+-                                    pickle.size()));
 -  }
 -
    main_task_runner_->PostTask(

+ 7 - 6
patches/core/ungoogled-chromium/disable-webstore-urls.patch

@@ -78,7 +78,7 @@
  }  // namespace extensions
 --- a/extensions/browser/updater/extension_downloader.cc
 +++ b/extensions/browser/updater/extension_downloader.cc
-@@ -92,27 +92,18 @@ const char kNotFromWebstoreInstallSource
+@@ -89,28 +89,19 @@ const char kNotFromWebstoreInstallSource
  const char kDefaultInstallSource[] = "";
  const char kReinstallInstallSource[] = "reinstall";
  
@@ -88,6 +88,7 @@
 -    "https://www.googleapis.com/auth/chromewebstore.readonly";
 +    "trk:10:https://www.googleapis.com/auth/chromewebstore.readonly";
  
+ ExtensionDownloader::TestObserver* g_test_observer = nullptr;
  ExtensionDownloaderTestDelegate* g_test_delegate = nullptr;
  
  #define RETRY_HISTOGRAM(name, retry_count, url)                           \
@@ -108,7 +109,7 @@
  
  bool ShouldRetryRequest(const network::SimpleURLLoader* loader) {
    DCHECK(loader);
-@@ -342,10 +333,6 @@ void ExtensionDownloader::DoStartAllPend
+@@ -334,10 +325,6 @@ void ExtensionDownloader::DoStartAllPend
      AddToFetches(fetches_preparing, std::move(task));
    pending_tasks_.clear();
  
@@ -119,7 +120,7 @@
  }
  
  void ExtensionDownloader::SetIdentityManager(
-@@ -384,11 +371,6 @@ bool ExtensionDownloader::AddExtensionDa
+@@ -389,11 +376,6 @@ bool ExtensionDownloader::AddExtensionDa
      return false;
    }
  
@@ -131,7 +132,7 @@
    // Skip extensions with empty IDs.
    if (task.id.empty()) {
      DLOG(WARNING) << "Found extension with empty ID";
-@@ -398,7 +380,7 @@ bool ExtensionDownloader::AddExtensionDa
+@@ -403,7 +385,7 @@ bool ExtensionDownloader::AddExtensionDa
  
    if (task.update_url.is_empty()) {
      // Fill in default update URL.
@@ -140,7 +141,7 @@
    }
  
    DCHECK(!task.update_url.is_empty());
-@@ -795,20 +777,6 @@ void ExtensionDownloader::HandleManifest
+@@ -808,20 +790,6 @@ void ExtensionDownloader::HandleManifest
          update.second->info);
    }
  
@@ -161,7 +162,7 @@
    ExtensionIdSet extension_ids_with_errors;
    for (const auto& failure : failures)
      extension_ids_with_errors.insert(failure.first.id);
-@@ -1392,11 +1360,7 @@ bool ExtensionDownloader::IterateFetchCr
+@@ -1396,11 +1364,7 @@ bool ExtensionDownloader::IterateFetchCr
    // fetch.
    switch (fetch->credentials) {
      case ExtensionFetch::CREDENTIALS_NONE:

+ 206 - 115
patches/core/ungoogled-chromium/fix-building-without-safebrowsing.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -606,8 +606,6 @@ static_library("browser") {
+@@ -611,8 +611,6 @@ static_library("browser") {
      "internal_auth.h",
      "interstitials/chrome_settings_page_helper.cc",
      "interstitials/chrome_settings_page_helper.h",
@@ -11,7 +11,7 @@
      "invalidation/profile_invalidation_provider_factory.cc",
      "invalidation/profile_invalidation_provider_factory.h",
      "k_anonymity_service/k_anonymity_service_client.cc",
-@@ -3640,10 +3638,6 @@ static_library("browser") {
+@@ -3654,10 +3652,6 @@ static_library("browser") {
        "enterprise/connectors/analysis/analysis_service_settings.h",
        "enterprise/connectors/analysis/analysis_settings.cc",
        "enterprise/connectors/analysis/analysis_settings.h",
@@ -22,7 +22,7 @@
        "enterprise/connectors/analysis/content_analysis_dialog.cc",
        "enterprise/connectors/analysis/content_analysis_dialog.h",
        "enterprise/connectors/analysis/content_analysis_downloads_delegate.cc",
-@@ -3912,10 +3906,6 @@ static_library("browser") {
+@@ -3932,10 +3926,6 @@ static_library("browser") {
        "new_tab_page/modules/recipes/recipes_service_factory.h",
        "new_tab_page/modules/recipes/time_format_util.cc",
        "new_tab_page/modules/recipes/time_format_util.h",
@@ -33,15 +33,15 @@
        "new_tab_page/new_tab_page_util.cc",
        "new_tab_page/new_tab_page_util.h",
        "new_tab_page/one_google_bar/one_google_bar_data.cc",
-@@ -4361,7 +4351,6 @@ static_library("browser") {
-       "//chrome/browser/new_tab_page/modules/feed:mojo_bindings",
+@@ -4383,7 +4373,6 @@ static_library("browser") {
+       "//chrome/browser/new_tab_page/modules/history_clusters:mojo_bindings",
        "//chrome/browser/new_tab_page/modules/photos:mojo_bindings",
        "//chrome/browser/new_tab_page/modules/recipes:mojo_bindings",
 -      "//chrome/browser/new_tab_page/modules/safe_browsing:mojo_bindings",
        "//chrome/browser/policy:path_parser",
        "//chrome/browser/profile_resetter:profile_reset_report_proto",
        "//chrome/browser/resource_coordinator:intervention_policy_database_proto",
-@@ -7563,9 +7552,14 @@ static_library("browser") {
+@@ -7581,9 +7570,14 @@ static_library("browser") {
        "//components/safe_browsing/content/browser:safe_browsing_blocking_page",
        "//components/safe_browsing/content/browser/download:download_stats",
        "//components/safe_browsing/content/common:file_type_policies",
@@ -59,7 +59,7 @@
      sources += [
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -4962,11 +4962,13 @@ ChromeContentBrowserClient::CreateThrott
+@@ -4995,11 +4995,13 @@ ChromeContentBrowserClient::CreateThrott
        &throttles);
  #endif
  
@@ -73,7 +73,7 @@
  
  #if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
    MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
-@@ -6487,26 +6489,7 @@ ChromeContentBrowserClient::GetSafeBrows
+@@ -6541,26 +6543,7 @@ ChromeContentBrowserClient::GetSafeBrows
      const std::vector<std::string>& allowlist_domains) {
    DCHECK_CURRENTLY_ON(BrowserThread::IO);
  
@@ -101,7 +101,7 @@
  }
  
  safe_browsing::RealTimeUrlLookupServiceBase*
-@@ -6527,11 +6510,6 @@ ChromeContentBrowserClient::GetUrlLookup
+@@ -6581,11 +6564,6 @@ ChromeContentBrowserClient::GetUrlLookup
          GetForProfile(profile);
    }
  #endif
@@ -113,43 +113,6 @@
    return nullptr;
  }
  
---- a/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
-+++ b/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
-@@ -144,34 +144,6 @@ void MaybeCreateSafeBrowsingForRenderer(
-         const std::vector<std::string>& allowlist_domains)>
-         get_checker_delegate,
-     mojo::PendingReceiver<safe_browsing::mojom::SafeBrowsing> receiver) {
--  DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
--
--  content::RenderProcessHost* render_process_host =
--      content::RenderProcessHost::FromID(process_id);
--  if (!render_process_host)
--    return;
--
--  PrefService* pref_service =
--      Profile::FromBrowserContext(render_process_host->GetBrowserContext())
--          ->GetPrefs();
--
--  std::vector<std::string> allowlist_domains =
--      safe_browsing::GetURLAllowlistByPolicy(pref_service);
--
--  bool safe_browsing_enabled =
--      safe_browsing::IsSafeBrowsingEnabled(*pref_service);
--  content::GetIOThreadTaskRunner({})->PostTask(
--      FROM_HERE,
--      base::BindOnce(
--          &safe_browsing::MojoSafeBrowsingImpl::MaybeCreate, process_id,
--          resource_context,
--          base::BindRepeating(get_checker_delegate, safe_browsing_enabled,
--                              // Navigation initiated from renderer should never
--                              // check when safe browsing is disabled, because
--                              // enterprise check only supports mainframe URL.
--                              /*should_check_on_sb_disabled=*/false,
--                              allowlist_domains),
--          std::move(receiver)));
- }
- #endif
- 
 --- a/chrome/browser/component_updater/chrome_client_side_phishing_component_installer.cc
 +++ b/chrome/browser/component_updater/chrome_client_side_phishing_component_installer.cc
 @@ -29,20 +29,6 @@ namespace {
@@ -185,7 +148,7 @@
  
 --- a/chrome/browser/devtools/devtools_window.cc
 +++ b/chrome/browser/devtools/devtools_window.cc
-@@ -73,6 +73,7 @@
+@@ -72,6 +72,7 @@
  #include "content/public/browser/web_contents.h"
  #include "content/public/common/content_client.h"
  #include "content/public/common/url_constants.h"
@@ -195,7 +158,15 @@
  #include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
 --- a/chrome/browser/download/bubble/download_bubble_controller.cc
 +++ b/chrome/browser/download/bubble/download_bubble_controller.cc
-@@ -400,8 +400,6 @@ void DownloadBubbleUIController::Process
+@@ -25,7 +25,6 @@
+ #include "chrome/browser/download/offline_item_utils.h"
+ #include "chrome/browser/offline_items_collection/offline_content_aggregator_factory.h"
+ #include "chrome/browser/profiles/profile_key.h"
+-#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
+ #include "chrome/browser/safe_browsing/safe_browsing_service.h"
+ #include "chrome/browser/ui/browser.h"
+ #include "chrome/browser/ui/browser_finder.h"
+@@ -458,8 +457,6 @@ void DownloadBubbleUIController::Process
        commands.ExecuteCommand(command);
        break;
      case DownloadCommands::REVIEW:
@@ -206,15 +177,15 @@
        RetryDownload(model, command);
 --- a/chrome/browser/download/chrome_download_manager_delegate.cc
 +++ b/chrome/browser/download/chrome_download_manager_delegate.cc
-@@ -133,7 +133,6 @@ using content::DownloadManager;
+@@ -136,7 +136,6 @@ using content::DownloadManager;
  using download::DownloadItem;
  using download::DownloadPathReservationTracker;
  using download::PathValidationResult;
 -using safe_browsing::DownloadFileType;
- using safe_browsing::DownloadProtectionService;
  using ConnectionType = net::NetworkChangeNotifier::ConnectionType;
  
-@@ -1489,7 +1488,6 @@ void ChromeDownloadManagerDelegate::OnDo
+ #if BUILDFLAG(FULL_SAFE_BROWSING)
+@@ -1496,7 +1495,6 @@ void ChromeDownloadManagerDelegate::OnDo
      DownloadItemModel model(item);
      model.DetermineAndSetShouldPreferOpeningInBrowser(
          target_info->target_path, target_info->is_filetype_handled_safely);
@@ -222,7 +193,7 @@
    }
    if (ShouldBlockFile(item, target_info->danger_type)) {
      MaybeReportDangerousDownloadBlocked(
-@@ -1568,54 +1566,6 @@ bool ChromeDownloadManagerDelegate::IsOp
+@@ -1575,54 +1573,6 @@ bool ChromeDownloadManagerDelegate::IsOp
  bool ChromeDownloadManagerDelegate::ShouldBlockFile(
      download::DownloadItem* item,
      download::DownloadDangerType danger_type) const {
@@ -277,7 +248,7 @@
  
    return false;
  }
-@@ -1630,7 +1580,6 @@ void ChromeDownloadManagerDelegate::Mayb
+@@ -1637,7 +1587,6 @@ void ChromeDownloadManagerDelegate::Mayb
      service->MaybeSendDangerousDownloadOpenedReport(download,
                                                      show_download_in_folder);
    }
@@ -285,7 +256,7 @@
    if (!download->GetAutoOpened()) {
      download::DownloadContent download_content =
          download::DownloadContentFromMimeType(download->GetMimeType(), false);
-@@ -1638,6 +1587,7 @@ void ChromeDownloadManagerDelegate::Mayb
+@@ -1645,6 +1594,7 @@ void ChromeDownloadManagerDelegate::Mayb
          download->GetDangerType(), download_content, base::Time::Now(),
          download->GetEndTime(), show_download_in_folder);
    }
@@ -293,7 +264,7 @@
  }
  
  void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
-@@ -1695,8 +1645,7 @@ void ChromeDownloadManagerDelegate::Chec
+@@ -1702,8 +1652,7 @@ void ChromeDownloadManagerDelegate::Chec
    DCHECK(download_item);
    DCHECK(download_item->IsSavePackageDownload());
  
@@ -305,7 +276,7 @@
  
 --- a/chrome/browser/download/download_item_model.cc
 +++ b/chrome/browser/download/download_item_model.cc
-@@ -917,100 +917,10 @@ void DownloadItemModel::ExecuteCommand(D
+@@ -926,101 +926,10 @@ void DownloadItemModel::ExecuteCommand(D
  
  DownloadItemModel::BubbleUIInfo
  DownloadItemModel::GetBubbleUIInfoForTailoredWarning() const {
@@ -320,7 +291,8 @@
 -    return DownloadUIModel::BubbleUIInfo(
 -               l10n_util::GetStringUTF16(
 -                   IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_SUSPICIOUS_ARCHIVE))
--        .AddIconAndColor(views::kInfoIcon, ui::kColorAlertMediumSeverity)
+-        .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
+-                         ui::kColorAlertMediumSeverity)
 -        .AddPrimaryButton(DownloadCommands::Command::DISCARD)
 -        .AddSubpageButton(l10n_util::GetStringUTF16(IDS_DOWNLOAD_BUBBLE_DELETE),
 -                          DownloadCommands::Command::DISCARD,
@@ -353,7 +325,7 @@
 -                   l10n_util::GetStringFUTF16(
 -                       IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT_AND_ACCOUNT,
 -                       base::ASCIIToUTF16(email)))
--            .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
+-            .AddIconAndColor(vector_icons::kDangerousIcon,
 -                             ui::kColorAlertHighSeverity)
 -            .AddPrimaryButton(DownloadCommands::Command::DISCARD)
 -            .AddSubpageButton(
@@ -365,7 +337,7 @@
 -    return DownloadUIModel::BubbleUIInfo(
 -               l10n_util::GetStringUTF16(
 -                   IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT))
--        .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
+-        .AddIconAndColor(vector_icons::kDangerousIcon,
 -                         ui::kColorAlertHighSeverity)
 -        .AddPrimaryButton(DownloadCommands::Command::DISCARD)
 -        .AddSubpageButton(l10n_util::GetStringUTF16(IDS_DOWNLOAD_BUBBLE_DELETE),
@@ -429,7 +401,7 @@
  void RecordOpenedDangerousConfirmDialog(
 --- a/chrome/browser/download/download_target_determiner.cc
 +++ b/chrome/browser/download/download_target_determiner.cc
-@@ -989,12 +989,14 @@ void DownloadTargetDeterminer::CheckVisi
+@@ -995,12 +995,14 @@ void DownloadTargetDeterminer::CheckVisi
      bool visited_referrer_before) {
    DCHECK_CURRENTLY_ON(BrowserThread::UI);
    DCHECK_EQ(STATE_DETERMINE_INTERMEDIATE_PATH, next_state_);
@@ -444,7 +416,7 @@
    danger_level_ = GetDangerLevel(
        visited_referrer_before ? VISITED_REFERRER : NO_VISITS_TO_REFERRER);
    if (danger_level_ != DownloadFileType::NOT_DANGEROUS &&
-@@ -1266,6 +1268,7 @@ DownloadFileType::DangerLevel DownloadTa
+@@ -1272,6 +1274,7 @@ DownloadFileType::DangerLevel DownloadTa
  
  absl::optional<base::Time>
  DownloadTargetDeterminer::GetLastDownloadBypassTimestamp() const {
@@ -452,7 +424,7 @@
    safe_browsing::SafeBrowsingMetricsCollector* metrics_collector =
        safe_browsing::SafeBrowsingMetricsCollectorFactory::GetForProfile(
            GetProfile());
-@@ -1274,6 +1277,9 @@ DownloadTargetDeterminer::GetLastDownloa
+@@ -1280,6 +1283,9 @@ DownloadTargetDeterminer::GetLastDownloa
                                   safe_browsing::SafeBrowsingMetricsCollector::
                                       EventType::DANGEROUS_DOWNLOAD_BYPASS)
                             : absl::nullopt;
@@ -487,7 +459,57 @@
  std::u16string ContentAnalysisDownloadsDelegate::GetBypassJustificationLabel()
 --- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
 +++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
-@@ -236,14 +236,6 @@ void FilesRequestHandler::OnGotFileInfo(
+@@ -158,49 +158,12 @@ void FilesRequestHandler::FileRequestCal
+ }
+ 
+ bool FilesRequestHandler::UploadDataImpl() {
+-  safe_browsing::IncrementCrashKey(
+-      safe_browsing::ScanningCrashKey::PENDING_FILE_UPLOADS, paths_.size());
+-
+-  if (!paths_.empty()) {
+-    safe_browsing::IncrementCrashKey(
+-        safe_browsing::ScanningCrashKey::TOTAL_FILE_UPLOADS, paths_.size());
+-
+-    std::vector<safe_browsing::FileOpeningJob::FileOpeningTask> tasks(
+-        paths_.size());
+-    for (size_t i = 0; i < paths_.size(); ++i)
+-      tasks[i].request = PrepareFileRequest(i);
+-
+-    file_opening_job_ =
+-        std::make_unique<safe_browsing::FileOpeningJob>(std::move(tasks));
+-    return true;
+-  }
+-
+   // If zero files were passed to the FilesRequestHandler, we call the callback
+   // directly.
+   MaybeCompleteScanRequest();
+   return false;
+ }
+ 
+-safe_browsing::FileAnalysisRequest* FilesRequestHandler::PrepareFileRequest(
+-    size_t index) {
+-  DCHECK_LT(index, paths_.size());
+-  base::FilePath path = paths_[index];
+-  auto request = std::make_unique<safe_browsing::FileAnalysisRequest>(
+-      *analysis_settings_, path, path.BaseName(), /*mime_type*/ "",
+-      /* delay_opening_file */ true,
+-      base::BindOnce(&FilesRequestHandler::FileRequestCallback,
+-                     weak_ptr_factory_.GetWeakPtr(), index),
+-      base::BindOnce(&FilesRequestHandler::FileRequestStartCallback,
+-                     weak_ptr_factory_.GetWeakPtr(), index));
+-  safe_browsing::FileAnalysisRequest* request_raw = request.get();
+-  PrepareRequest(AccessPointToEnterpriseConnector(access_point_), request_raw);
+-  request_raw->GetRequestData(base::BindOnce(
+-      &FilesRequestHandler::OnGotFileInfo, weak_ptr_factory_.GetWeakPtr(),
+-      std::move(request), index));
+-
+-  return request_raw;
+-}
+-
+ void FilesRequestHandler::OnGotFileInfo(
+     std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
+     size_t index,
+@@ -236,14 +199,6 @@ void FilesRequestHandler::OnGotFileInfo(
  void FilesRequestHandler::FinishRequestEarly(
      std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
      safe_browsing::BinaryUploadService::Result result) {
@@ -502,9 +524,22 @@
    request->FinishRequest(result,
                           enterprise_connectors::ContentAnalysisResponse());
  }
+--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
++++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
+@@ -110,10 +110,6 @@ class FilesRequestHandler : public Reque
+       enterprise_connectors::ContentAnalysisResponse response);
+ 
+  private:
+-  // Prepares an upload request for the file at `path`.  If the file
+-  // cannot be uploaded it will have a failure verdict added to `result_`.
+-  safe_browsing::FileAnalysisRequest* PrepareFileRequest(size_t index);
+-
+   // Called when the file info for `path` has been fetched. Also begins the
+   // upload process.
+   void OnGotFileInfo(
 --- a/chrome/browser/enterprise/connectors/connectors_service.cc
 +++ b/chrome/browser/enterprise/connectors/connectors_service.cc
-@@ -407,19 +407,6 @@ absl::optional<std::string> ConnectorsSe
+@@ -413,19 +413,6 @@ absl::optional<std::string> ConnectorsSe
    return absl::nullopt;
  }
  
@@ -586,7 +621,7 @@
    signals.Set(device_signals::names::kBuiltInDnsClientEnabled,
 --- a/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
 +++ b/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
-@@ -387,7 +387,7 @@ void RealtimeReportingClient::ReportReal
+@@ -406,7 +406,7 @@ void RealtimeReportingClient::ReportEven
  }
  
  std::string RealtimeReportingClient::GetProfileUserName() const {
@@ -744,8 +779,8 @@
      "pending_extension_info.cc",
 --- a/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
 +++ b/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
-@@ -87,7 +87,6 @@ void EnsureApiBrowserContextKeyedService
-   extensions::PasswordsPrivateEventRouterFactory::GetInstance();
+@@ -95,7 +95,6 @@ void EnsureApiBrowserContextKeyedService
+ #endif  // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
    extensions::PreferenceAPI::GetFactoryInstance();
    extensions::ProcessesAPI::GetFactoryInstance();
 -  extensions::SafeBrowsingPrivateEventRouterFactory::GetInstance();
@@ -776,7 +811,7 @@
  }
  
  CookiesGetAllFunction::CookiesGetAllFunction() {
-@@ -383,26 +368,6 @@ void CookiesGetAllFunction::GetCookieLis
+@@ -377,26 +362,6 @@ void CookiesGetAllFunction::GetCookieLis
  }
  
  void CookiesGetAllFunction::NotifyExtensionTelemetry() {
@@ -825,7 +860,7 @@
    info.enterprise_profile_id = signals.enterprise_profile_id;
 --- a/chrome/browser/extensions/chrome_extensions_browser_client.cc
 +++ b/chrome/browser/extensions/chrome_extensions_browser_client.cc
-@@ -703,56 +703,17 @@ void ChromeExtensionsBrowserClient::Noti
+@@ -705,56 +705,17 @@ void ChromeExtensionsBrowserClient::Noti
      content::BrowserContext* context,
      const ExtensionId& extension_id,
      const std::string& code) const {
@@ -892,8 +927,8 @@
 -#include "chrome/browser/extensions/omaha_attributes_handler.h"
  #include "chrome/browser/extensions/pending_extension_manager.h"
  #include "chrome/browser/extensions/permissions_updater.h"
- #include "chrome/browser/extensions/shared_module_service.h"
-@@ -192,7 +191,6 @@ void ExtensionService::BlocklistExtensio
+ #include "chrome/browser/extensions/profile_util.h"
+@@ -194,7 +193,6 @@ void ExtensionService::BlocklistExtensio
    blocklist_prefs::SetSafeBrowsingExtensionBlocklistState(
        extension_id, BitMapBlocklistState::BLOCKLISTED_MALWARE,
        extension_prefs_);
@@ -901,7 +936,7 @@
  }
  
  bool ExtensionService::OnExternalExtensionUpdateUrlFound(
-@@ -358,9 +356,6 @@ ExtensionService::ExtensionService(Profi
+@@ -362,9 +360,6 @@ ExtensionService::ExtensionService(
        safe_browsing_verdict_handler_(extension_prefs,
                                       ExtensionRegistry::Get(profile),
                                       this),
@@ -911,7 +946,7 @@
        registry_(ExtensionRegistry::Get(profile)),
        pending_extension_manager_(profile),
        install_directory_(install_directory),
-@@ -856,100 +851,6 @@ bool ExtensionService::IsExtensionEnable
+@@ -861,100 +856,6 @@ bool ExtensionService::IsExtensionEnable
    return extension_registrar_.IsExtensionEnabled(extension_id);
  }
  
@@ -1021,8 +1056,8 @@
 -#include "chrome/browser/extensions/omaha_attributes_handler.h"
  #include "chrome/browser/extensions/pending_extension_manager.h"
  #include "chrome/browser/extensions/safe_browsing_verdict_handler.h"
- #include "chrome/browser/profiles/profile_manager.h"
-@@ -278,40 +277,11 @@ class ExtensionService : public Extensio
+ #include "chrome/browser/profiles/profile_manager_observer.h"
+@@ -279,40 +278,11 @@ class ExtensionService : public Extensio
    // nothing.
    void EnableExtension(const std::string& extension_id);
  
@@ -1063,7 +1098,7 @@
    // Disables the extension. If the extension is already disabled, just adds
    // the |disable_reasons| (a bitmask of disable_reason::DisableReason - there
    // can be multiple DisableReasons e.g. when an extension comes in disabled
-@@ -655,8 +625,6 @@ class ExtensionService : public Extensio
+@@ -661,8 +631,6 @@ class ExtensionService : public Extensio
  
    SafeBrowsingVerdictHandler safe_browsing_verdict_handler_;
  
@@ -1074,7 +1109,7 @@
  
 --- a/chrome/browser/extensions/extension_system_impl.cc
 +++ b/chrome/browser/extensions/extension_system_impl.cc
-@@ -464,8 +464,6 @@ void ExtensionSystemImpl::InstallUpdate(
+@@ -465,8 +465,6 @@ void ExtensionSystemImpl::InstallUpdate(
  void ExtensionSystemImpl::PerformActionBasedOnOmahaAttributes(
      const std::string& extension_id,
      const base::Value& attributes) {
@@ -1119,16 +1154,15 @@
    }
 --- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
 +++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
-@@ -32,8 +32,6 @@
+@@ -32,7 +32,6 @@
  #include "chrome/browser/download/download_prefs.h"
  #include "chrome/browser/file_system_access/file_system_access_permission_request_manager.h"
  #include "chrome/browser/profiles/profile.h"
--#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
--#include "chrome/browser/safe_browsing/safe_browsing_service.h"
+-#include "chrome/browser/safe_browsing/download_protection/download_protection_util.h"
  #include "chrome/browser/ui/file_system_access_dialogs.h"
  #include "chrome/common/chrome_paths.h"
  #include "chrome/common/pdf_util.h"
-@@ -394,85 +392,6 @@ bool ShouldBlockAccessToPath(const base:
+@@ -398,85 +397,6 @@ bool ShouldBlockAccessToPath(const base:
    return true;
  }
  
@@ -1214,7 +1248,7 @@
  std::string GenerateLastPickedDirectoryKey(const std::string& id) {
    return id.empty() ? kDefaultLastPickedDirectoryKey
                      : base::StrCat({kCustomLastPickedDirectoryKey, "-", id});
-@@ -492,13 +411,7 @@ base::StringPiece GetGrantKeyFromGrantTy
+@@ -496,13 +416,7 @@ base::StringPiece GetGrantKeyFromGrantTy
  bool FileHasDangerousExtension(const url::Origin& origin,
                                 const base::FilePath& path,
                                 Profile* profile) {
@@ -1229,7 +1263,7 @@
  }
  
  }  // namespace
-@@ -1328,29 +1241,6 @@ void ChromeFileSystemAccessPermissionCon
+@@ -1334,29 +1248,6 @@ void ChromeFileSystemAccessPermissionCon
        std::move(callback));
  }
  
@@ -1274,15 +1308,15 @@
  
 --- a/chrome/browser/media/webrtc/display_media_access_handler.cc
 +++ b/chrome/browser/media/webrtc/display_media_access_handler.cc
-@@ -24,6 +24,7 @@
+@@ -23,6 +23,7 @@
  #include "chrome/browser/safe_browsing/user_interaction_observer.h"
  #include "chrome/common/pref_names.h"
  #include "components/prefs/pref_service.h"
 +#include "components/safe_browsing/buildflags.h"
  #include "components/url_formatter/elide_url.h"
  #include "content/public/browser/browser_thread.h"
- #include "content/public/browser/desktop_capture.h"
-@@ -112,6 +113,7 @@ void DisplayMediaAccessHandler::HandleRe
+ #include "content/public/browser/desktop_media_id.h"
+@@ -110,6 +111,7 @@ void DisplayMediaAccessHandler::HandleRe
      return;
    }
  
@@ -1290,7 +1324,7 @@
    // SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
    // warnings until user interaction. If the current page has a delayed warning,
    // it'll have a user interaction observer attached. Show the warning
-@@ -127,6 +129,7 @@ void DisplayMediaAccessHandler::HandleRe
+@@ -125,6 +127,7 @@ void DisplayMediaAccessHandler::HandleRe
      observer->OnDesktopCaptureRequest();
      return;
    }
@@ -1324,7 +1358,7 @@
  #include "chrome/browser/safe_browsing/extension_telemetry/extension_telemetry_service.h"
  #include "chrome/browser/safe_browsing/extension_telemetry/extension_telemetry_service_factory.h"
  #include "chrome/browser/safe_browsing/extension_telemetry/password_reuse_signal.h"
-@@ -901,6 +900,7 @@ autofill::LanguageCode ChromePasswordMan
+@@ -886,6 +885,7 @@ autofill::LanguageCode ChromePasswordMan
    return autofill::LanguageCode();
  }
  
@@ -1332,7 +1366,7 @@
  safe_browsing::PasswordProtectionService*
  ChromePasswordManagerClient::GetPasswordProtectionService() const {
    return safe_browsing::ChromePasswordProtectionService::
-@@ -974,13 +974,9 @@ void ChromePasswordManagerClient::CheckP
+@@ -959,13 +959,9 @@ void ChromePasswordManagerClient::CheckP
    telemetry_service->AddSignal(std::move(password_reuse_signal));
  #endif  // !BUILDFLAG(IS_ANDROID)
  }
@@ -1347,7 +1381,7 @@
  }
  
  #if !BUILDFLAG(IS_ANDROID)
-@@ -989,36 +985,10 @@ void ChromePasswordManagerClient::MaybeR
+@@ -974,36 +970,10 @@ void ChromePasswordManagerClient::MaybeR
      bool is_federated,
      const url::Origin& federated_origin,
      const std::u16string& login_user_name) const {
@@ -1384,7 +1418,7 @@
  }
  #endif
  
-@@ -1526,7 +1496,9 @@ void ChromePasswordManagerClient::OnPast
+@@ -1511,7 +1481,9 @@ void ChromePasswordManagerClient::OnPast
    }
  
    was_on_paste_called_ = true;
@@ -1394,7 +1428,7 @@
  }
  
  void ChromePasswordManagerClient::RenderFrameCreated(
-@@ -1562,7 +1534,9 @@ void ChromePasswordManagerClient::OnInpu
+@@ -1547,7 +1519,9 @@ void ChromePasswordManagerClient::OnInpu
    if (key_event.windows_key_code == (ui::VKEY_V & 0x1f)) {
      OnPaste();
    } else {
@@ -1404,7 +1438,7 @@
    }
  #endif  // BUILDFLAG(IS_ANDROID)
  }
-@@ -1593,6 +1567,7 @@ bool ChromePasswordManagerClient::IsPass
+@@ -1578,6 +1552,7 @@ bool ChromePasswordManagerClient::IsPass
      is_enabled = false;
    }
  
@@ -1412,7 +1446,7 @@
    // SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
    // warnings until user interaction. If the current page has a delayed warning,
    // it'll have a user interaction observer attached. Disable password
-@@ -1603,6 +1578,7 @@ bool ChromePasswordManagerClient::IsPass
+@@ -1588,6 +1563,7 @@ bool ChromePasswordManagerClient::IsPass
      observer->OnPasswordSaveOrAutofillDenied();
      is_enabled = false;
    }
@@ -1617,7 +1651,7 @@
  }
 --- a/chrome/browser/policy/configuration_policy_handler_list_factory.cc
 +++ b/chrome/browser/policy/configuration_policy_handler_list_factory.cc
-@@ -96,6 +96,7 @@
+@@ -94,6 +94,7 @@
  #include "components/policy/policy_constants.h"
  #include "components/privacy_sandbox/privacy_sandbox_prefs.h"
  #include "components/proxy_config/proxy_policy_handler.h"
@@ -1625,7 +1659,7 @@
  #include "components/safe_browsing/content/common/file_type_policies_prefs.h"
  #include "components/safe_browsing/core/common/safe_browsing_policy_handler.h"
  #include "components/safe_browsing/core/common/safe_browsing_prefs.h"
-@@ -1904,8 +1905,6 @@ std::unique_ptr<ConfigurationPolicyHandl
+@@ -1930,8 +1931,6 @@ std::unique_ptr<ConfigurationPolicyHandl
    handlers->AddHandler(
        std::make_unique<bookmarks::ManagedBookmarksPolicyHandler>(
            chrome_schema));
@@ -1634,7 +1668,7 @@
    handlers->AddHandler(std::make_unique<syncer::SyncPolicyHandler>());
    handlers->AddHandler(
        std::make_unique<URLBlocklistPolicyHandler>(key::kURLBlocklist));
-@@ -1963,13 +1962,6 @@ std::unique_ptr<ConfigurationPolicyHandl
+@@ -1990,13 +1989,6 @@ std::unique_ptr<ConfigurationPolicyHandl
            prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode,
            prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope, chrome_schema));
  
@@ -1650,7 +1684,7 @@
  
 --- a/chrome/browser/prefs/browser_prefs.cc
 +++ b/chrome/browser/prefs/browser_prefs.cc
-@@ -265,7 +265,6 @@
+@@ -263,7 +263,6 @@
  #include "chrome/browser/new_tab_page/modules/drive/drive_service.h"
  #include "chrome/browser/new_tab_page/modules/photos/photos_service.h"
  #include "chrome/browser/new_tab_page/modules/recipes/recipes_service.h"
@@ -1658,7 +1692,7 @@
  #include "chrome/browser/new_tab_page/promos/promo_service.h"
  #include "chrome/browser/policy/developer_tools_policy_handler.h"
  #include "chrome/browser/search/background/ntp_custom_background_service.h"
-@@ -1547,7 +1546,6 @@ void RegisterProfilePrefs(user_prefs::Pr
+@@ -1485,7 +1484,6 @@ void RegisterProfilePrefs(user_prefs::Pr
    NewTabPageHandler::RegisterProfilePrefs(registry);
    NewTabPageUI::RegisterProfilePrefs(registry);
    NewTabUI::RegisterProfilePrefs(registry);
@@ -1668,7 +1702,22 @@
    PinnedTabCodec::RegisterProfilePrefs(registry);
 --- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
 +++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
-@@ -602,7 +602,6 @@ void ChromeBrowserMainExtraPartsProfiles
+@@ -829,13 +829,13 @@ void ChromeBrowserMainExtraPartsProfiles
+   safe_browsing::CloudBinaryUploadServiceFactory::GetInstance();
+   safe_browsing::ExtensionTelemetryServiceFactory::GetInstance();
+   safe_browsing::HashRealTimeServiceFactory::GetInstance();
+-#endif
+   safe_browsing::ChromePasswordProtectionServiceFactory::GetInstance();
+   safe_browsing::ClientSideDetectionServiceFactory::GetInstance();
+   safe_browsing::RealTimeUrlLookupServiceFactory::GetInstance();
+   safe_browsing::SafeBrowsingMetricsCollectorFactory::GetInstance();
+   safe_browsing::SafeBrowsingNavigationObserverManagerFactory::GetInstance();
+   safe_browsing::VerdictCacheManagerFactory::GetInstance();
++#endif
+ #if BUILDFLAG(IS_MAC)
+   if (screentime::IsScreenTimeEnabled()) {
+     screentime::HistoryBridgeFactory::GetInstance();
+@@ -884,7 +884,6 @@ void ChromeBrowserMainExtraPartsProfiles
    }
  #endif
    TabRestoreServiceFactory::GetInstance();
@@ -1678,7 +1727,7 @@
  #if !BUILDFLAG(IS_ANDROID)
 --- a/chrome/browser/resources/settings/lazy_load.ts
 +++ b/chrome/browser/resources/settings/lazy_load.ts
-@@ -167,7 +167,6 @@ export {SettingsPrivacyGuideDialogElemen
+@@ -170,7 +170,6 @@ export {SettingsPrivacyGuideDialogElemen
  export {PrivacyGuideHistorySyncFragmentElement} from './privacy_page/privacy_guide/privacy_guide_history_sync_fragment.js';
  export {PrivacyGuideMsbbFragmentElement} from './privacy_page/privacy_guide/privacy_guide_msbb_fragment.js';
  export {SettingsPrivacyGuidePageElement} from './privacy_page/privacy_guide/privacy_guide_page.js';
@@ -1696,6 +1745,40 @@
  import './privacy_guide_welcome_fragment.js';
  import './step_indicator.js';
  
+--- a/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.cc
++++ b/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.cc
+@@ -71,10 +71,6 @@ void FileOpeningJob::ProcessNextTask(bas
+     if (tasks_[i].taken.exchange(true, std::memory_order_relaxed))
+       continue;
+ 
+-    // Since we know we now have taken `tasks_[i]`, we can do the file opening
+-    // work safely.
+-    tasks_[i].request->OpenFile();
+-
+     // Now that the file opening work is done, `num_unopened_files_` is
+     // decremented atomically and we return to free the thread.
+     num_unopened_files_.fetch_sub(1, std::memory_order_relaxed);
+--- a/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.h
++++ b/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.h
+@@ -11,7 +11,6 @@
+ #include "base/gtest_prod_util.h"
+ #include "base/memory/raw_ptr.h"
+ #include "base/task/post_job.h"
+-#include "chrome/browser/safe_browsing/cloud_content_scanning/file_analysis_request.h"
+ 
+ namespace safe_browsing {
+ 
+@@ -24,10 +23,6 @@ class FileOpeningJob {
+     FileOpeningTask();
+     ~FileOpeningTask();
+ 
+-    // Non-owning pointer to the request corresponding to the file to open.
+-    raw_ptr<safe_browsing::FileAnalysisRequest, DanglingUntriaged> request =
+-        nullptr;
+-
+     // Indicates if this task has been taken and is owned by a thread.
+     std::atomic_bool taken{false};
+   };
 --- a/chrome/browser/safe_browsing/metrics/safe_browsing_metrics_provider.cc
 +++ b/chrome/browser/safe_browsing/metrics/safe_browsing_metrics_provider.cc
 @@ -17,15 +17,6 @@ SafeBrowsingMetricsProvider::~SafeBrowsi
@@ -1851,7 +1934,7 @@
  }  // namespace
 --- a/chrome/browser/ui/BUILD.gn
 +++ b/chrome/browser/ui/BUILD.gn
-@@ -555,7 +555,6 @@ static_library("ui") {
+@@ -558,7 +558,6 @@ static_library("ui") {
      "//components/renderer_context_menu",
      "//components/resources",
      "//components/safe_browsing/content/browser",
@@ -1859,7 +1942,7 @@
      "//components/safe_browsing/content/browser/password_protection",
      "//components/safe_browsing/content/browser/web_ui",
      "//components/safe_browsing/core/browser/db:database_manager",
-@@ -3513,8 +3512,6 @@ static_library("ui") {
+@@ -3542,8 +3541,6 @@ static_library("ui") {
        "startup/web_app_startup_utils.h",
        "tab_contents/chrome_web_contents_menu_helper.cc",
        "tab_contents/chrome_web_contents_menu_helper.h",
@@ -1868,7 +1951,7 @@
        "views/autofill/payments/virtual_card_selection_dialog_view.cc",
        "views/autofill/payments/virtual_card_selection_dialog_view.h",
        "views/autofill/payments/webauthn_dialog_view.cc",
-@@ -4970,8 +4967,6 @@ static_library("ui") {
+@@ -5018,8 +5015,6 @@ static_library("ui") {
        "views/safe_browsing/prompt_for_scanning_modal_dialog.h",
        "views/safe_browsing/tailored_security_desktop_dialog_manager.cc",
        "views/safe_browsing/tailored_security_desktop_dialog_manager.h",
@@ -1905,7 +1988,15 @@
  void JavaScriptTabModalDialogManagerDelegateDesktop::DidCloseDialog() {
 --- a/chrome/browser/ui/views/download/download_item_view.cc
 +++ b/chrome/browser/ui/views/download/download_item_view.cc
-@@ -815,9 +815,7 @@ void DownloadItemView::UpdateLabels() {
+@@ -38,7 +38,6 @@
+ #include "chrome/browser/icon_manager.h"
+ #include "chrome/browser/safe_browsing/advanced_protection_status_manager.h"
+ #include "chrome/browser/safe_browsing/advanced_protection_status_manager_factory.h"
+-#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
+ #include "chrome/browser/safe_browsing/safe_browsing_service.h"
+ #include "chrome/browser/ui/browser.h"
+ #include "chrome/browser/ui/color/chrome_color_id.h"
+@@ -815,9 +814,7 @@ void DownloadItemView::UpdateLabels() {
    deep_scanning_label_->SetVisible(mode_ ==
                                     download::DownloadItemMode::kDeepScanning);
    if (deep_scanning_label_->GetVisible()) {
@@ -1916,7 +2007,7 @@
                         ? IDS_PROMPT_DEEP_SCANNING_DOWNLOAD
                         : IDS_PROMPT_DEEP_SCANNING_APP_DOWNLOAD;
      const std::u16string filename = ElidedFilename(*deep_scanning_label_);
-@@ -843,11 +841,15 @@ void DownloadItemView::UpdateButtons() {
+@@ -843,11 +840,15 @@ void DownloadItemView::UpdateButtons() {
    }
  
    const bool allow_open_during_deep_scan =
@@ -1932,7 +2023,7 @@
    open_button_->SetEnabled((mode_ == download::DownloadItemMode::kNormal) ||
                             prompt_to_scan || allow_open_during_deep_scan);
  
-@@ -1270,7 +1272,9 @@ void DownloadItemView::ShowContextMenuIm
+@@ -1270,7 +1271,9 @@ void DownloadItemView::ShowContextMenuIm
  }
  
  void DownloadItemView::OpenDownloadDuringAsyncScanning() {
@@ -2076,7 +2167,7 @@
                                 std::move(callback),
 --- a/chrome/test/BUILD.gn
 +++ b/chrome/test/BUILD.gn
-@@ -1406,7 +1406,6 @@ if (!is_android) {
+@@ -1466,7 +1466,6 @@ if (!is_android) {
        "//components/resources",
        "//components/safe_browsing:buildflags",
        "//components/safe_browsing/content/browser",
@@ -2084,7 +2175,7 @@
        "//components/safe_browsing/content/browser:safe_browsing_service",
        "//components/safe_browsing/content/browser/password_protection",
        "//components/safe_browsing/content/browser/password_protection:test_support",
-@@ -5988,7 +5987,6 @@ test("unit_tests") {
+@@ -6082,7 +6081,6 @@ test("unit_tests") {
      "//components/resources",
      "//components/safe_browsing:buildflags",
      "//components/safe_browsing/content/browser",
@@ -2094,7 +2185,7 @@
      "//components/safe_browsing/content/browser/web_ui",
 --- a/components/password_manager/content/browser/content_password_manager_driver.cc
 +++ b/components/password_manager/content/browser/content_password_manager_driver.cc
-@@ -442,7 +442,7 @@ void ContentPasswordManagerDriver::Check
+@@ -452,7 +452,7 @@ void ContentPasswordManagerDriver::Check
    if (!password_manager::bad_message::CheckFrameNotPrerendering(
            render_frame_host_))
      return;
@@ -2188,7 +2279,7 @@
 -    "user_population.h",
    ]
  
-   public_deps = [ "//google_apis:google_apis" ]
+   configs += [ "//build/config/compiler:wexit_time_destructors" ]
 --- a/components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_service.h
 +++ b/components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_service.h
 @@ -5,6 +5,7 @@
@@ -2311,17 +2402,17 @@
    // possible to request one. This is used to block file dialogs from being
 --- a/extensions/browser/updater/update_service.cc
 +++ b/extensions/browser/updater/update_service.cc
-@@ -125,14 +125,6 @@ void UpdateService::OnEvent(Events event
+@@ -131,14 +131,6 @@ void UpdateService::OnCrxStateChange(Upd
        break;
    }
  
 -  if (should_perform_action_on_omaha_attributes) {
--    base::Value::Dict attributes = GetExtensionOmahaAttributes(extension_id);
+-    base::Value::Dict attributes = GetExtensionOmahaAttributes(item);
 -    // Note that it's important to perform actions even if |attributes| is
 -    // empty, missing values may default to false and have associated logic.
 -    ExtensionSystem::Get(browser_context_)
 -        ->PerformActionBasedOnOmahaAttributes(
--            extension_id, base::Value(std::move(attributes)));
+-            item.id, base::Value(std::move(attributes)));
 -  }
  }
  
@@ -2339,7 +2430,7 @@
  declare_args() {
 --- a/weblayer/BUILD.gn
 +++ b/weblayer/BUILD.gn
-@@ -468,7 +468,6 @@ source_set("weblayer_lib_base") {
+@@ -470,7 +470,6 @@ source_set("weblayer_lib_base") {
      "//components/profile_metrics",
      "//components/reduce_accept_language/browser",
      "//components/safe_browsing/content/browser",

File diff suppressed because it is too large
+ 209 - 138
patches/core/ungoogled-chromium/remove-unused-preferences-fields.patch


+ 4 - 2
patches/core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch

@@ -1,6 +1,6 @@
 --- a/components/search_engines/prepopulated_engines.json
 +++ b/components/search_engines/prepopulated_engines.json
-@@ -114,25 +114,11 @@
+@@ -114,27 +114,11 @@
      },
  
      "google": {
@@ -10,11 +10,13 @@
 -      "search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:iOSSearchLanguage}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
 -      "suggest_url": "{google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:omniboxFocusType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:clientCacheTimeToLive}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}",
 -      "image_url": "{google:baseSearchByImageURL}upload",
+-      "image_translate_url": "{google:baseSearchByImageURL}upload?filtertype=tr&{imageTranslateSourceLocale}{imageTranslateTargetLocale}",
 -      "contextual_search_url": "{google:baseURL}_/contextualsearch?{google:contextualSearchVersion}{google:contextualSearchContextData}",
 -      "image_url_post_params": "encoded_image={google:imageThumbnail},image_url={google:imageURL},sbisrc={google:imageSearchSource},original_width={google:imageOriginalWidth},original_height={google:imageOriginalHeight}",
 -      "side_search_param": "sidesearch",
+-      "image_translate_source_language_param_key": "sourcelang",
+-      "image_translate_target_language_param_key": "targetlang",
 -      "side_image_search_param": "sideimagesearch",
--      "image_search_branding_label": "Google Lens",
 -      "search_intent_params": ["si", "gs_ssp"],
 -      "alternate_urls": [
 -        "{google:baseURL}#q={searchTerms}",

+ 4 - 4
patches/core/ungoogled-chromium/toggle-translation-via-switch.patch

@@ -1,15 +1,15 @@
 # Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
 --- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
 +++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
-@@ -143,6 +143,7 @@
- #include "components/spellcheck/common/spellcheck_common.h"
+@@ -146,6 +146,7 @@
  #include "components/spellcheck/spellcheck_buildflags.h"
  #include "components/strings/grit/components_strings.h"
+ #include "components/supervised_user/core/common/buildflags.h"
 +#include "components/translate/core/common/translate_switches.h"
  #include "components/translate/core/browser/translate_download_manager.h"
  #include "components/translate/core/browser/translate_manager.h"
  #include "components/translate/core/browser/translate_prefs.h"
-@@ -1837,6 +1838,7 @@ void RenderViewContextMenu::AppendPageIt
+@@ -1881,6 +1882,7 @@ void RenderViewContextMenu::AppendPageIt
      menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
  
    if (CanTranslate(/*menu_logging=*/true)) {
@@ -47,7 +47,7 @@
      request_pending_ = true;
 --- a/components/translate/core/browser/translate_manager.cc
 +++ b/components/translate/core/browser/translate_manager.cc
-@@ -865,8 +865,9 @@ void TranslateManager::FilterIsTranslate
+@@ -870,8 +870,9 @@ void TranslateManager::FilterIsTranslate
          TriggerDecision::kDisabledOffline);
    }
  

+ 18 - 18
patches/extra/bromite/fingerprinting-flags-client-rects-and-measuretext.patch

@@ -9,7 +9,7 @@
 
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -2442,6 +2442,7 @@ static_library("browser") {
+@@ -2457,6 +2457,7 @@ static_library("browser") {
      "//third_party/libyuv",
      "//third_party/metrics_proto",
      "//third_party/re2",
@@ -19,7 +19,7 @@
      "//third_party/widevine/cdm:headers",
 --- a/chrome/browser/about_flags.cc
 +++ b/chrome/browser/about_flags.cc
-@@ -158,6 +158,7 @@
+@@ -155,6 +155,7 @@
  #include "components/translate/core/browser/translate_ranker_impl.h"
  #include "components/translate/core/common/translate_util.h"
  #include "components/ui_devtools/switches.h"
@@ -62,7 +62,7 @@
  #include "components/viz/common/switches.h"
  #include "components/viz/host/gpu_client.h"
  #include "content/browser/attribution_reporting/attribution_manager.h"
-@@ -3379,6 +3380,8 @@ void RenderProcessHostImpl::PropagateBro
+@@ -3361,6 +3362,8 @@ void RenderProcessHostImpl::PropagateBro
      switches::kEnableWebGLImageChromium,
      switches::kEnableWebGPUDeveloperFeatures,
      switches::kFileUrlPathAlias,
@@ -91,17 +91,17 @@
  #include "ui/accessibility/accessibility_features.h"
  #include "ui/base/ui_base_features.h"
  #include "ui/events/blink/blink_features.h"
-@@ -408,6 +409,10 @@ void SetRuntimeFeaturesFromCommandLine(c
-       {wrf::EnableWebGPUDeveloperFeatures,
+@@ -432,6 +433,10 @@ void SetRuntimeFeaturesFromCommandLine(c
         switches::kEnableWebGPUDeveloperFeatures, true},
-       {wrf::EnableDirectSockets, switches::kIsolatedAppOrigins, true},
+       {wrf::EnableDirectSockets, switches::kEnableIsolatedWebAppsInRenderer,
+        true},
 +      {wrf::EnableFingerprintingClientRectsNoise,
 +       switches::kFingerprintingClientRectsNoise, true},
 +      {wrf::EnableFingerprintingCanvasMeasureTextNoise,
 +       switches::kFingerprintingCanvasMeasureTextNoise, true},
    };
+ 
    for (const auto& mapping : switchToFeatureMapping) {
-     if (command_line.HasSwitch(mapping.switch_name)) {
 --- a/third_party/blink/public/platform/web_runtime_features.h
 +++ b/third_party/blink/public/platform/web_runtime_features.h
 @@ -68,6 +68,9 @@ class BLINK_PLATFORM_EXPORT WebRuntimeFe
@@ -124,7 +124,7 @@
  #include "base/ranges/algorithm.h"
  #include "base/task/single_thread_task_runner.h"
  #include "base/time/time.h"
-@@ -927,6 +928,14 @@ Range* Document::CreateRangeAdjustedToTr
+@@ -925,6 +926,14 @@ Range* Document::CreateRangeAdjustedToTr
                                       Position::BeforeNode(*shadow_host));
  }
  
@@ -139,7 +139,7 @@
  SelectorQueryCache& Document::GetSelectorQueryCache() {
    if (!selector_query_cache_)
      selector_query_cache_ = std::make_unique<SelectorQueryCache>();
-@@ -2255,6 +2264,15 @@ void Document::UpdateStyleAndLayoutTreeF
+@@ -2261,6 +2270,15 @@ void Document::UpdateStyleAndLayoutTreeF
  #if DCHECK_IS_ON()
    AssertLayoutTreeUpdated(*this, true /* allow_dirty_container_subtrees */);
  #endif
@@ -157,7 +157,7 @@
  void Document::InvalidateStyleAndLayoutForFontUpdates() {
 --- a/third_party/blink/renderer/core/dom/document.h
 +++ b/third_party/blink/renderer/core/dom/document.h
-@@ -514,6 +514,10 @@ class CORE_EXPORT Document : public Cont
+@@ -517,6 +517,10 @@ class CORE_EXPORT Document : public Cont
      has_xml_declaration_ = has_xml_declaration ? 1 : 0;
    }
  
@@ -168,7 +168,7 @@
    AtomicString visibilityState() const;
    bool IsPageVisible() const;
    bool hidden() const;
-@@ -2329,6 +2333,9 @@ class CORE_EXPORT Document : public Cont
+@@ -2359,6 +2363,9 @@ class CORE_EXPORT Document : public Cont
  
    base::ElapsedTimer start_time_;
  
@@ -180,7 +180,7 @@
  
 --- a/third_party/blink/renderer/core/dom/element.cc
 +++ b/third_party/blink/renderer/core/dom/element.cc
-@@ -2134,6 +2134,11 @@ DOMRectList* Element::getClientRects() {
+@@ -2126,6 +2126,11 @@ DOMRectList* Element::getClientRects() {
    DCHECK(element_layout_object);
    GetDocument().AdjustQuadsForScrollAndAbsoluteZoom(quads,
                                                      *element_layout_object);
@@ -192,7 +192,7 @@
    return MakeGarbageCollected<DOMRectList>(quads);
  }
  
-@@ -2161,6 +2166,9 @@ gfx::RectF Element::GetBoundingClientRec
+@@ -2153,6 +2158,9 @@ gfx::RectF Element::GetBoundingClientRec
    DCHECK(element_layout_object);
    GetDocument().AdjustRectForScrollAndAbsoluteZoom(result,
                                                     *element_layout_object);
@@ -204,7 +204,7 @@
  
 --- a/third_party/blink/renderer/core/dom/range.cc
 +++ b/third_party/blink/renderer/core/dom/range.cc
-@@ -1612,11 +1612,21 @@ DOMRectList* Range::getClientRects() con
+@@ -1607,11 +1607,21 @@ DOMRectList* Range::getClientRects() con
    Vector<gfx::QuadF> quads;
    GetBorderAndTextQuads(quads);
  
@@ -267,7 +267,7 @@
                const TextDirection&,
 --- a/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
 +++ b/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
-@@ -953,9 +953,15 @@ TextMetrics* CanvasRenderingContext2D::m
+@@ -948,9 +948,15 @@ TextMetrics* CanvasRenderingContext2D::m
    TextDirection direction =
        ToTextDirection(GetState().GetDirection(), canvas());
  
@@ -286,7 +286,7 @@
  void CanvasRenderingContext2D::drawFormattedText(
 --- a/third_party/blink/renderer/platform/BUILD.gn
 +++ b/third_party/blink/renderer/platform/BUILD.gn
-@@ -1690,6 +1690,7 @@ component("platform") {
+@@ -1695,6 +1695,7 @@ component("platform") {
      "//components/paint_preview/common",
      "//components/power_scheduler",
      "//components/search_engines:search_engine_utils",
@@ -311,7 +311,7 @@
  }  // namespace blink
 --- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
 +++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
-@@ -1413,6 +1413,12 @@
+@@ -1600,6 +1600,12 @@
        origin_trial_feature_name: "Focusgroup",
      },
      {
@@ -322,5 +322,5 @@
 +    },
 +    {
        name: "FocuslessSpatialNavigation",
+       base_feature: "none",
        settable_from_internals: true,
-     },

+ 7 - 7
patches/extra/bromite/flag-fingerprinting-canvas-image-data-noise.patch

@@ -34,7 +34,7 @@ approach to change color components.
  #endif  // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
 --- a/content/browser/renderer_host/render_process_host_impl.cc
 +++ b/content/browser/renderer_host/render_process_host_impl.cc
-@@ -3382,6 +3382,7 @@ void RenderProcessHostImpl::PropagateBro
+@@ -3364,6 +3364,7 @@ void RenderProcessHostImpl::PropagateBro
      switches::kFileUrlPathAlias,
      switches::kFingerprintingClientRectsNoise,
      switches::kFingerprintingCanvasMeasureTextNoise,
@@ -44,15 +44,15 @@ approach to change color components.
      switches::kForceEnablePepperVideoDecoderDevAPI,
 --- a/content/child/runtime_features.cc
 +++ b/content/child/runtime_features.cc
-@@ -413,6 +413,8 @@ void SetRuntimeFeaturesFromCommandLine(c
+@@ -437,6 +437,8 @@ void SetRuntimeFeaturesFromCommandLine(c
         switches::kFingerprintingClientRectsNoise, true},
        {wrf::EnableFingerprintingCanvasMeasureTextNoise,
         switches::kFingerprintingCanvasMeasureTextNoise, true},
 +      {wrf::EnableFingerprintingCanvasImageDataNoise,
 +       switches::kFingerprintingCanvasImageDataNoise, true},
    };
+ 
    for (const auto& mapping : switchToFeatureMapping) {
-     if (command_line.HasSwitch(mapping.switch_name)) {
 --- a/third_party/blink/public/platform/web_runtime_features.h
 +++ b/third_party/blink/public/platform/web_runtime_features.h
 @@ -70,6 +70,7 @@ class BLINK_PLATFORM_EXPORT WebRuntimeFe
@@ -73,7 +73,7 @@ approach to change color components.
  #include "third_party/blink/renderer/platform/graphics/stroke_data.h"
  #include "third_party/blink/renderer/platform/graphics/video_frame_image_util.h"
  #include "third_party/blink/renderer/platform/heap/garbage_collected.h"
-@@ -2113,6 +2114,9 @@ ImageData* BaseRenderingContext2D::getIm
+@@ -2089,6 +2090,9 @@ ImageData* BaseRenderingContext2D::getIm
            snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
        DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
      }
@@ -85,7 +85,7 @@ approach to change color components.
    return image_data;
 --- a/third_party/blink/renderer/platform/BUILD.gn
 +++ b/third_party/blink/renderer/platform/BUILD.gn
-@@ -1647,7 +1647,9 @@ component("platform") {
+@@ -1652,7 +1652,9 @@ component("platform") {
      "//third_party/blink/renderer:non_test_config",
    ]
  
@@ -322,7 +322,7 @@ approach to change color components.
    // Methods overridden by all sub-classes
 --- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
 +++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
-@@ -1419,6 +1419,9 @@
+@@ -1606,6 +1606,9 @@
        name: "FingerprintingCanvasMeasureTextNoise",
      },
      {
@@ -330,5 +330,5 @@ approach to change color components.
 +    },
 +    {
        name: "FocuslessSpatialNavigation",
+       base_feature: "none",
        settable_from_internals: true,
-     },

+ 3 - 3
patches/extra/bromite/flag-max-connections-per-host.patch

@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
 
 --- a/chrome/browser/BUILD.gn
 +++ b/chrome/browser/BUILD.gn
-@@ -2176,6 +2176,7 @@ static_library("browser") {
+@@ -2188,6 +2188,7 @@ static_library("browser") {
      "//components/net_log",
      "//components/network_hints/common:mojo_bindings",
      "//components/network_session_configurator/browser",
@@ -100,7 +100,7 @@ with limited CPU/memory resources and it is disabled by default.
  
 --- a/chrome/browser/flag_descriptions.cc
 +++ b/chrome/browser/flag_descriptions.cc
-@@ -1906,6 +1906,10 @@ const char kUnthrottledNestedTimeoutDesc
+@@ -1944,6 +1944,10 @@ const char kUnthrottledNestedTimeoutDesc
      "websites abusing the API will still eventually have their setTimeouts "
      "clamped.";
  
@@ -113,7 +113,7 @@ with limited CPU/memory resources and it is disabled by default.
  const char kMediaRouterCastAllowAllIPsDescription[] =
 --- a/chrome/browser/flag_descriptions.h
 +++ b/chrome/browser/flag_descriptions.h
-@@ -1071,6 +1071,9 @@ extern const char kLogJsConsoleMessagesD
+@@ -1085,6 +1085,9 @@ extern const char kLogJsConsoleMessagesD
  extern const char kUnthrottledNestedTimeoutName[];
  extern const char kUnthrottledNestedTimeoutDescription[];
  

+ 4 - 4
patches/extra/inox-patchset/0006-modify-default-prefs.patch

@@ -12,7 +12,7 @@
  void BackgroundModeManager::RegisterProfile(Profile* profile) {
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -1540,7 +1540,7 @@ void ChromeContentBrowserClient::Registe
+@@ -1552,7 +1552,7 @@ void ChromeContentBrowserClient::Registe
  void ChromeContentBrowserClient::RegisterProfilePrefs(
      user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
@@ -23,7 +23,7 @@
    // used for mapping the command-line flags).
 --- a/chrome/browser/net/profile_network_context_service.cc
 +++ b/chrome/browser/net/profile_network_context_service.cc
-@@ -376,7 +376,7 @@ void ProfileNetworkContextService::Updat
+@@ -391,7 +391,7 @@ void ProfileNetworkContextService::Updat
  void ProfileNetworkContextService::RegisterProfilePrefs(
      user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(
@@ -94,7 +94,7 @@
    registry->RegisterDictionaryPref(prefs::kAppWindowPlacement);
 --- a/components/autofill/core/common/autofill_prefs.cc
 +++ b/components/autofill/core/common/autofill_prefs.cc
-@@ -107,7 +107,7 @@ const char kAutocompleteLastVersionReten
+@@ -103,7 +103,7 @@ const char kAutocompleteLastVersionReten
  void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
    // Synced prefs. Used for cross-device choices, e.g., credit card Autofill.
    registry->RegisterBooleanPref(
@@ -103,7 +103,7 @@
        user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
    registry->RegisterIntegerPref(
        prefs::kAutofillLastVersionDeduped, 0,
-@@ -117,7 +117,7 @@ void RegisterProfilePrefs(user_prefs::Pr
+@@ -113,7 +113,7 @@ void RegisterProfilePrefs(user_prefs::Pr
        prefs::kAutofillLastVersionDisusedAddressesDeleted, 0,
        user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
    registry->RegisterBooleanPref(

+ 1 - 1
patches/extra/inox-patchset/0008-restore-classic-ntp.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/search/search.cc
 +++ b/chrome/browser/search/search.cc
-@@ -184,26 +184,7 @@ struct NewTabURLDetails {
+@@ -185,26 +185,7 @@ struct NewTabURLDetails {
                               : chrome::kChromeUINewTabPageThirdPartyURL);
  #endif
  

+ 1 - 1
patches/extra/iridium-browser/browser-disable-profile-auto-import-on-first-run.patch

@@ -5,7 +5,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
 
 --- a/chrome/browser/chrome_browser_main.cc
 +++ b/chrome/browser/chrome_browser_main.cc
-@@ -1610,11 +1610,6 @@ int ChromeBrowserMainParts::PreMainMessa
+@@ -1614,11 +1614,6 @@ int ChromeBrowserMainParts::PreMainMessa
    // and preferences have been registered since some of the import code depends
    // on preferences.
    if (first_run::IsChromeFirstRun()) {

+ 1 - 1
patches/extra/iridium-browser/prefs-always-prompt-for-download-directory-by-defaul.patch

@@ -29,7 +29,7 @@ TLDR: Do not let files sneak onto the disk too easily.
 
 --- a/chrome/browser/download/download_prefs.cc
 +++ b/chrome/browser/download/download_prefs.cc
-@@ -274,7 +274,7 @@ void DownloadPrefs::RegisterProfilePrefs
+@@ -279,7 +279,7 @@ void DownloadPrefs::RegisterProfilePrefs
      user_prefs::PrefRegistrySyncable* registry) {
    registry->RegisterBooleanPref(
        prefs::kPromptForDownload,

+ 1 - 1
patches/extra/iridium-browser/updater-disable-auto-update.patch

@@ -16,7 +16,7 @@ the case anyway, since we are based off Chromium, not Chrome.
 
 --- a/chrome/browser/app_controller_mac.mm
 +++ b/chrome/browser/app_controller_mac.mm
-@@ -835,7 +835,7 @@ class AppControllerNativeThemeObserver :
+@@ -815,7 +815,7 @@ class AppControllerNativeThemeObserver :
    CFStringRef checkInterval = CFSTR("checkInterval");
    CFPropertyListRef plist = CFPreferencesCopyAppValue(checkInterval, app);
    if (!plist) {

+ 8 - 8
patches/extra/ungoogled-chromium/add-flag-for-close-confirmation.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/ui/browser.cc
 +++ b/chrome/browser/ui/browser.cc
-@@ -138,6 +138,8 @@
+@@ -137,6 +137,8 @@
  #include "chrome/browser/ui/tabs/tab_strip_model.h"
  #include "chrome/browser/ui/tabs/tab_utils.h"
  #include "chrome/browser/ui/ui_features.h"
@@ -9,7 +9,7 @@
  #include "chrome/browser/ui/web_applications/app_browser_controller.h"
  #include "chrome/browser/ui/web_applications/web_app_launch_utils.h"
  #include "chrome/browser/ui/webui/signin/login_ui_service.h"
-@@ -474,6 +476,7 @@ Browser::Browser(const CreateParams& par
+@@ -473,6 +475,7 @@ Browser::Browser(const CreateParams& par
        omit_from_session_restore_(params.omit_from_session_restore),
        should_trigger_session_restore_(params.should_trigger_session_restore),
        cancel_download_confirmation_state_(NOT_PROMPTED),
@@ -17,7 +17,7 @@
        override_bounds_(params.initial_bounds),
        initial_show_state_(params.initial_show_state),
        initial_workspace_(params.initial_workspace),
-@@ -837,6 +840,7 @@ Browser::WarnBeforeClosingResult Browser
+@@ -836,6 +839,7 @@ Browser::WarnBeforeClosingResult Browser
    // true or there are no pending downloads we need to prompt about) then
    // there's no need to warn.
    if (force_skip_warning_user_on_close_ || CanCloseWithInProgressDownloads())
@@ -25,7 +25,7 @@
      return WarnBeforeClosingResult::kOkToClose;
  
    DCHECK(!warn_before_closing_callback_)
-@@ -871,6 +875,7 @@ bool Browser::TryToCloseWindow(
+@@ -870,6 +874,7 @@ bool Browser::TryToCloseWindow(
  
  void Browser::ResetTryToCloseWindow() {
    cancel_download_confirmation_state_ = NOT_PROMPTED;
@@ -33,7 +33,7 @@
    unload_controller_.ResetTryToCloseWindow();
  }
  
-@@ -2805,6 +2810,62 @@ bool Browser::CanCloseWithInProgressDown
+@@ -2813,6 +2818,62 @@ bool Browser::CanCloseWithInProgressDown
    return false;
  }
  
@@ -96,7 +96,7 @@
  void Browser::InProgressDownloadResponse(bool cancel_downloads) {
    if (cancel_downloads) {
      cancel_download_confirmation_state_ = RESPONSE_RECEIVED;
-@@ -2823,6 +2884,22 @@ void Browser::InProgressDownloadResponse
+@@ -2831,6 +2892,22 @@ void Browser::InProgressDownloadResponse
  
    std::move(warn_before_closing_callback_)
        .Run(WarnBeforeClosingResult::kDoNotClose);
@@ -129,7 +129,7 @@
  #include "chrome/browser/ui/signin_view_controller.h"
  #include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
  #include "chrome/browser/ui/unload_controller.h"
-@@ -1060,12 +1061,17 @@ class Browser : public TabStripModelObse
+@@ -1071,12 +1072,17 @@ class Browser : public TabStripModelObse
    // Returns true if the window can close, false otherwise.
    bool CanCloseWithInProgressDownloads();
  
@@ -147,7 +147,7 @@
    // Called when all warnings have completed when attempting to close the
    // browser directly (e.g. via hotkey, close button, terminate signal, etc.)
    // Used as a WarnBeforeClosingCallback by ShouldCloseWindow().
-@@ -1235,6 +1241,8 @@ class Browser : public TabStripModelObse
+@@ -1243,6 +1249,8 @@ class Browser : public TabStripModelObse
    // when the browser is closed with in-progress downloads.
    CancelDownloadConfirmationState cancel_download_confirmation_state_;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-for-custom-ntp.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/chrome_content_browser_client.cc
 +++ b/chrome/browser/chrome_content_browser_client.cc
-@@ -860,10 +860,14 @@ bool HandleNewTabPageLocationOverride(
+@@ -872,10 +872,14 @@ bool HandleNewTabPageLocationOverride(
  
    // Don't change the URL when incognito mode.
    if (profile->IsOffTheRecord())

+ 3 - 3
patches/extra/ungoogled-chromium/add-flag-for-disabling-link-drag.patch

@@ -11,7 +11,7 @@
  #endif  // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
 --- a/third_party/blink/common/features.cc
 +++ b/third_party/blink/common/features.cc
-@@ -31,6 +31,8 @@ BASE_FEATURE(kAttributionReportingCrossA
+@@ -32,6 +32,8 @@ BASE_FEATURE(kAttributionReportingCrossA
               "AttributionReportingCrossAppWeb",
               base::FEATURE_DISABLED_BY_DEFAULT);
  
@@ -33,7 +33,7 @@
  BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kAutomaticLazyFrameLoadingToAds);
 --- a/third_party/blink/renderer/core/editing/selection_controller.cc
 +++ b/third_party/blink/renderer/core/editing/selection_controller.cc
-@@ -1325,10 +1325,14 @@ FrameSelection& SelectionController::Sel
+@@ -1328,10 +1328,14 @@ FrameSelection& SelectionController::Sel
  }
  
  bool IsSelectionOverLink(const MouseEventWithHitTestResults& event) {
@@ -50,7 +50,7 @@
    Node* inner_node = event.InnerNode();
 --- a/third_party/blink/renderer/core/input/mouse_event_manager.cc
 +++ b/third_party/blink/renderer/core/input/mouse_event_manager.cc
-@@ -663,8 +663,14 @@ WebInputEventResult MouseEventManager::H
+@@ -651,8 +651,14 @@ WebInputEventResult MouseEventManager::H
  
    bool single_click = event.Event().click_count <= 1;
  

+ 2 - 2
patches/extra/ungoogled-chromium/add-flag-for-incognito-themes.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/ui/views/frame/browser_frame.cc
 +++ b/chrome/browser/ui/views/frame/browser_frame.cc
-@@ -441,5 +441,7 @@ bool BrowserFrame::RegenerateFrameOnThem
+@@ -460,5 +460,7 @@ bool BrowserFrame::RegenerateFrameOnThem
  }
  
  bool BrowserFrame::ShouldUseDarkTheme() const {
@@ -10,7 +10,7 @@
  }
 --- a/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
 +++ b/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
-@@ -432,7 +432,9 @@ void NTPResourceCache::CreateNewTabIncog
+@@ -426,7 +426,9 @@ void NTPResourceCache::CreateNewTabIncog
        profile_->GetPrefs()->GetString(prefs::kCurrentThemeID);
  
    // Colors.

+ 4 - 4
patches/extra/ungoogled-chromium/add-flag-for-omnibox-autocomplete-filtering.patch

@@ -42,7 +42,7 @@
  #include "base/feature_list.h"
  #include "base/format_macros.h"
  #include "base/functional/bind.h"
-@@ -341,6 +343,15 @@ AutocompleteController::AutocompleteCont
+@@ -343,6 +345,15 @@ AutocompleteController::AutocompleteCont
        search_service_worker_signal_sent_(false),
        template_url_service_(provider_client_->GetTemplateURLService()) {
    provider_types &= ~OmniboxFieldTrial::GetDisabledProviderTypes();
@@ -56,8 +56,8 @@
 +      provider_types &= ~AutocompleteProvider::TYPE_BUILTIN;
 +  }
  
-   if (OmniboxFieldTrial::kAutocompleteStabilityAsyncProvidersFirst.Get()) {
-     // Providers run in the order they're added. Run these async providers 1st
+   // Providers run in the order they're added. Async providers should run first
+   // so their async requests can be kicked off before waiting a few milliseconds
 --- a/components/omnibox/browser/history_url_provider.cc
 +++ b/components/omnibox/browser/history_url_provider.cc
 @@ -474,6 +474,9 @@ void HistoryURLProvider::Start(const Aut
@@ -80,7 +80,7 @@
  #include "base/feature_list.h"
  #include "base/functional/bind.h"
  #include "base/functional/callback.h"
-@@ -656,6 +657,9 @@ void SearchProvider::Run(bool query_is_p
+@@ -653,6 +654,9 @@ void SearchProvider::Run(bool query_is_p
  }
  
  void SearchProvider::DoHistoryQuery(bool minimal_changes) {

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-for-qr-generator.patch

@@ -27,7 +27,7 @@
    return true;
 --- a/chrome/browser/ui/views/location_bar/location_bar_view.cc
 +++ b/chrome/browser/ui/views/location_bar/location_bar_view.cc
-@@ -303,7 +303,8 @@ void LocationBarView::Init() {
+@@ -305,7 +305,8 @@ void LocationBarView::Init() {
  
      params.types_enabled.push_back(PageActionIconType::kSendTabToSelf);
      params.types_enabled.push_back(PageActionIconType::kClickToCall);

+ 3 - 3
patches/extra/ungoogled-chromium/add-flag-for-search-engine-collection.patch

@@ -80,7 +80,7 @@
  }
  
  bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
-@@ -1662,6 +1670,8 @@ SyncDataMap TemplateURLService::CreateGU
+@@ -1654,6 +1662,8 @@ SyncDataMap TemplateURLService::CreateGU
  
  void TemplateURLService::Init(const Initializer* initializers,
                                int num_initializers) {
@@ -89,7 +89,7 @@
    if (client_)
      client_->SetOwner(this);
  
-@@ -1800,6 +1810,9 @@ void TemplateURLService::ChangeToLoadedS
+@@ -1792,6 +1802,9 @@ void TemplateURLService::ChangeToLoadedS
  
  bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
      const std::string& host) const {
@@ -101,7 +101,7 @@
      return true;
 --- a/components/search_engines/template_url_service.h
 +++ b/components/search_engines/template_url_service.h
-@@ -768,6 +768,8 @@ class TemplateURLService : public WebDat
+@@ -769,6 +769,8 @@ class TemplateURLService : public WebDat
    // ---------- Browser state related members ---------------------------------
    raw_ptr<PrefService> prefs_ = nullptr;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-for-tab-hover-cards.patch

@@ -27,7 +27,7 @@
  #include "base/compiler_specific.h"
  #include "base/containers/adapters.h"
  #include "base/containers/contains.h"
-@@ -1643,6 +1644,8 @@ void TabStrip::OnMouseEventInTab(views::
+@@ -1644,6 +1645,8 @@ void TabStrip::OnMouseEventInTab(views::
  }
  
  void TabStrip::UpdateHoverCard(Tab* tab, HoverCardUpdateType update_type) {

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-for-tabsearch-button.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/ui/browser_command_controller.cc
 +++ b/chrome/browser/ui/browser_command_controller.cc
-@@ -1221,7 +1221,8 @@ void BrowserCommandController::InitComma
+@@ -1224,7 +1224,8 @@ void BrowserCommandController::InitComma
    command_updater_.UpdateCommandEnabled(IDC_WINDOW_CLOSE_OTHER_TABS,
                                          normal_window);
  

+ 16 - 16
patches/extra/ungoogled-chromium/add-flag-to-clear-data-on-exit.patch

@@ -1,14 +1,14 @@
 --- a/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager.cc
 +++ b/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager.cc
-@@ -25,6 +25,7 @@
+@@ -24,6 +24,7 @@
+ #include "chrome/browser/lifetime/browser_shutdown.h"
  #include "chrome/browser/profiles/profile.h"
- #include "chrome/browser/profiles/profile_manager.h"
  #include "chrome/browser/sync/sync_service_factory.h"
 +#include "components/browsing_data/core/features.h"
  #include "components/browsing_data/core/pref_names.h"
  #include "components/keep_alive_registry/keep_alive_types.h"
  #include "components/keep_alive_registry/scoped_keep_alive.h"
-@@ -157,6 +158,21 @@ class BrowsingDataRemoverObserver
+@@ -156,6 +157,21 @@ class BrowsingDataRemoverObserver
  #endif
  };
  
@@ -30,7 +30,7 @@
  uint64_t GetOriginTypeMask(const base::Value::List& data_types) {
    uint64_t result = 0;
    for (const auto& data_type : data_types) {
-@@ -305,7 +321,8 @@ void ChromeBrowsingDataLifetimeManager::
+@@ -304,7 +320,8 @@ void ChromeBrowsingDataLifetimeManager::
      bool keep_browser_alive) {
    const base::Value::List& data_types = profile_->GetPrefs()->GetList(
        browsing_data::prefs::kClearBrowsingDataOnExitList);
@@ -40,7 +40,7 @@
      profile_->GetPrefs()->SetBoolean(
          browsing_data::prefs::kClearBrowsingDataOnExitDeletionPending, true);
      auto* remover = profile_->GetBrowsingDataRemover();
-@@ -316,8 +333,8 @@ void ChromeBrowsingDataLifetimeManager::
+@@ -315,8 +332,8 @@ void ChromeBrowsingDataLifetimeManager::
        DCHECK(keep_browser_alive);
  #endif
      remover->RemoveAndReply(base::Time(), base::Time::Max(),
@@ -75,22 +75,22 @@
  #endif  // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
 --- a/components/browsing_data/core/features.cc
 +++ b/components/browsing_data/core/features.cc
-@@ -9,6 +9,8 @@
- namespace browsing_data {
- namespace features {
+@@ -7,6 +7,8 @@
+ #include "build/build_config.h"
  
+ namespace browsing_data::features {
 +BASE_FEATURE(kClearDataOnExit, "ClearDataOnExit", base::FEATURE_DISABLED_BY_DEFAULT);
 +
- BASE_FEATURE(kEnableRemovingAllThirdPartyCookies,
-              "EnableRemovingAllThirdPartyCookies",
-              base::FEATURE_DISABLED_BY_DEFAULT);
+ BASE_FEATURE(kEnableBrowsingDataLifetimeManager,
+              "BrowsingDataLifetimeManager",
+              base::FEATURE_ENABLED_BY_DEFAULT);
 --- a/components/browsing_data/core/features.h
 +++ b/components/browsing_data/core/features.h
-@@ -17,6 +17,7 @@ BASE_DECLARE_FEATURE(kEnableRemovingAllT
- // defined by the BrowsingDataLifetime policy.
- BASE_DECLARE_FEATURE(kEnableBrowsingDataLifetimeManager);
+@@ -8,6 +8,7 @@
+ #include "base/feature_list.h"
  
+ namespace browsing_data::features {
 +BASE_DECLARE_FEATURE(kClearDataOnExit);
- }  // namespace features
- }  // namespace browsing_data
  
+ // Enable BrowsingDataLifetimeManager that periodically delete browsing data as
+ // defined by the BrowsingDataLifetime policy.

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-close-window-with-last-tab.patch

@@ -8,7 +8,7 @@
  #include "base/containers/adapters.h"
  #include "base/containers/contains.h"
  #include "base/containers/flat_map.h"
-@@ -1828,6 +1829,10 @@ bool TabStripModel::CloseTabs(base::span
+@@ -1835,6 +1836,10 @@ bool TabStripModel::CloseTabs(base::span
    if (items.empty())
      return true;
  

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-configure-extension-downloading.patch

@@ -50,7 +50,7 @@
  bool IsExtensionDownload(const download::DownloadItem& download_item);
 --- a/chrome/browser/download/download_target_determiner.cc
 +++ b/chrome/browser/download/download_target_determiner.cc
-@@ -1186,10 +1186,12 @@ DownloadConfirmationReason DownloadTarge
+@@ -1192,10 +1192,12 @@ DownloadConfirmationReason DownloadTarge
      return DownloadConfirmationReason::SAVE_AS;
  
  #if BUILDFLAG(ENABLE_EXTENSIONS)

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-convert-popups-to-tabs.patch

@@ -13,7 +13,7 @@
  #endif  // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
 --- a/content/renderer/render_frame_impl.cc
 +++ b/content/renderer/render_frame_impl.cc
-@@ -1171,6 +1171,8 @@ WindowOpenDisposition NavigationPolicyTo
+@@ -1165,6 +1165,8 @@ WindowOpenDisposition NavigationPolicyTo
      case blink::kWebNavigationPolicyNewWindow:
        return WindowOpenDisposition::NEW_WINDOW;
      case blink::kWebNavigationPolicyNewPopup:

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-disable-local-history-expiration.patch

@@ -21,7 +21,7 @@
  #include "base/compiler_specific.h"
  #include "base/containers/flat_set.h"
  #include "base/feature_list.h"
-@@ -1164,7 +1165,8 @@ void HistoryBackend::InitImpl(
+@@ -1187,7 +1188,8 @@ void HistoryBackend::InitImpl(
    db_->GetStartDate(&first_recorded_time_);
  
    // Start expiring old stuff.

+ 2 - 2
patches/extra/ungoogled-chromium/add-flag-to-hide-extensions-menu.patch

@@ -16,7 +16,7 @@
  #include "extensions/common/extension_features.h"
  #include "ui/base/dragdrop/drag_drop_types.h"
  #include "ui/base/dragdrop/mojom/drag_drop_types.mojom-shared.h"
-@@ -347,6 +349,17 @@ void ExtensionsToolbarContainer::AnchorA
+@@ -348,6 +350,17 @@ void ExtensionsToolbarContainer::AnchorA
    widget->widget_delegate()->AsBubbleDialogDelegate()->SetAnchorView(
        anchor_view && anchor_view->GetVisible() ? anchor_view
                                                 : GetExtensionsButton());
@@ -34,7 +34,7 @@
    widget->Show();
  }
  
-@@ -849,6 +862,9 @@ void ExtensionsToolbarContainer::UpdateC
+@@ -846,6 +859,9 @@ void ExtensionsToolbarContainer::UpdateC
  }
  
  bool ExtensionsToolbarContainer::ShouldContainerBeVisible() const {

+ 1 - 1
patches/extra/ungoogled-chromium/add-flag-to-hide-fullscreen-exit-ui.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/ui/views/frame/browser_view.cc
 +++ b/chrome/browser/ui/views/frame/browser_view.cc
-@@ -1791,6 +1791,10 @@ void BrowserView::UpdateExclusiveAccessE
+@@ -1850,6 +1850,10 @@ void BrowserView::UpdateExclusiveAccessE
      ExclusiveAccessBubbleHideCallback bubble_first_hide_callback,
      bool notify_download,
      bool force_update) {

+ 1 - 1
patches/extra/ungoogled-chromium/add-ipv6-probing-option.patch

@@ -47,7 +47,7 @@
  // ICANN uses this localhost address to indicate a name collision.
  //
  // The policy in Chromium is to fail host resolving if it resolves to
-@@ -3768,7 +3763,7 @@ bool HostResolverManager::IsIPv6Reachabl
+@@ -3760,7 +3755,7 @@ bool HostResolverManager::IsIPv6Reachabl
        (tick_clock_->NowTicks() - last_ipv6_probe_time_).InMilliseconds() >
            kIPv6ProbePeriodMs) {
      SetLastIPv6ProbeResult(

+ 1 - 1
patches/extra/ungoogled-chromium/add-suggestions-url-field.patch

@@ -447,7 +447,7 @@
  }
 --- a/components/search_engines/template_url_service.h
 +++ b/components/search_engines/template_url_service.h
-@@ -262,7 +262,8 @@ class TemplateURLService : public WebDat
+@@ -263,7 +263,8 @@ class TemplateURLService : public WebDat
    void ResetTemplateURL(TemplateURL* url,
                          const std::u16string& title,
                          const std::u16string& keyword,

+ 1 - 1
patches/extra/ungoogled-chromium/add-ungoogled-flag-headers.patch

@@ -1,6 +1,6 @@
 --- a/chrome/browser/about_flags.cc
 +++ b/chrome/browser/about_flags.cc
-@@ -3209,7 +3209,13 @@ const FeatureEntry::FeatureVariation kPr
+@@ -3227,7 +3227,13 @@ const FeatureEntry::FeatureVariation kPr
  // calculate and verify checksum.
  //
  // When adding a new choice, add it to the end of the list.

+ 1 - 1
patches/extra/ungoogled-chromium/disable-download-quarantine.patch

@@ -147,7 +147,7 @@
  }  // namespace download
 --- a/content/browser/BUILD.gn
 +++ b/content/browser/BUILD.gn
-@@ -101,7 +101,6 @@ source_set("browser") {
+@@ -100,7 +100,6 @@ source_set("browser") {
      "//components/power_monitor",
      "//components/power_scheduler",
      "//components/services/filesystem:lib",

+ 1 - 1
patches/extra/ungoogled-chromium/disable-intranet-redirect-detector.patch

@@ -3,7 +3,7 @@
 
 --- a/chrome/browser/intranet_redirect_detector.cc
 +++ b/chrome/browser/intranet_redirect_detector.cc
-@@ -118,9 +118,7 @@ void IntranetRedirectDetector::FinishSle
+@@ -117,9 +117,7 @@ void IntranetRedirectDetector::FinishSle
    simple_loaders_.clear();
    resulting_origins_.clear();
  

+ 1 - 1
patches/extra/ungoogled-chromium/enable-default-prefetch-privacy-changes.patch

@@ -2,7 +2,7 @@
 
 --- a/third_party/blink/common/features.cc
 +++ b/third_party/blink/common/features.cc
-@@ -511,7 +511,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
+@@ -515,7 +515,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
  // crbug.com/988956.
  BASE_FEATURE(kPrefetchPrivacyChanges,
               "PrefetchPrivacyChanges",

+ 2 - 2
patches/extra/ungoogled-chromium/enable-page-saving-on-more-pages.patch

@@ -2,7 +2,7 @@
 
 --- a/chrome/browser/ui/browser_commands.cc
 +++ b/chrome/browser/ui/browser_commands.cc
-@@ -475,10 +475,6 @@ int GetContentRestrictions(const Browser
+@@ -477,10 +477,6 @@ int GetContentRestrictions(const Browser
      CoreTabHelper* core_tab_helper =
          CoreTabHelper::FromWebContents(current_tab);
      content_restrictions = core_tab_helper->content_restrictions();
@@ -13,7 +13,7 @@
    }
    return content_restrictions;
  }
-@@ -1403,8 +1399,7 @@ bool CanSavePage(const Browser* browser)
+@@ -1414,8 +1410,7 @@ bool CanSavePage(const Browser* browser)
        DownloadPrefs::DownloadRestriction::ALL_FILES) {
      return false;
    }

+ 2 - 2
patches/extra/ungoogled-chromium/enable-paste-and-go-new-tab-button.patch

@@ -13,7 +13,7 @@
        AddChildView(std::make_unique<views::InkDropContainerView>());
 --- a/chrome/browser/ui/views/tabs/tab_strip.cc
 +++ b/chrome/browser/ui/views/tabs/tab_strip.cc
-@@ -1890,8 +1890,6 @@ void TabStrip::NewTabButtonPressed(const
+@@ -1891,8 +1891,6 @@ void TabStrip::NewTabButtonPressed(const
  
      const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
      if (mouse.IsOnlyMiddleMouseButton()) {
@@ -22,7 +22,7 @@
          ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
          CHECK(clipboard);
          std::u16string clipboard_text;
-@@ -1899,7 +1897,6 @@ void TabStrip::NewTabButtonPressed(const
+@@ -1900,7 +1898,6 @@ void TabStrip::NewTabButtonPressed(const
                              /* data_dst = */ nullptr, &clipboard_text);
          if (!clipboard_text.empty())
            controller_->CreateNewTabWithLocation(clipboard_text);

+ 3 - 3
patches/extra/ungoogled-chromium/remove-uneeded-ui.patch

@@ -224,7 +224,7 @@
      <!-- Signout is not supported yet on lacros, https://crbug.com/1217645 -->
      <settings-toggle-button id="signinAllowedToggle"
          class="hr"
-@@ -60,12 +60,6 @@
+@@ -52,12 +52,6 @@
      </settings-toggle-button>
  </if><!-- not chromeos -->
  </if><!-- _google_chrome -->
@@ -257,7 +257,7 @@
                start-icon="settings:cookie"
 --- a/chrome/browser/resources/settings/privacy_page/security_page.html
 +++ b/chrome/browser/resources/settings/privacy_page/security_page.html
-@@ -145,11 +145,3 @@
+@@ -146,11 +146,3 @@
      </template>
  </if>
  
@@ -304,7 +304,7 @@
    Profile* profile = browser()->profile();
    if (profile->IsOffTheRecord() || profile->IsGuestSession())
      return gfx::ImageSkia();
-@@ -469,8 +470,7 @@ void ProfileMenuView::BuildIdentity() {
+@@ -470,8 +471,7 @@ void ProfileMenuView::BuildIdentity() {
          menu_subtitle_);
    } else {
      menu_title_ = std::u16string();

+ 46 - 21
pruning.list

@@ -79,7 +79,7 @@ chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap.ogg
 chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap_edge.ogg
 chrome/browser/resources/chromeos/accessibility/select_to_speak/earcons/null_selection.ogg
 chrome/browser/resources/media/mei_preload/preloaded_data.pb
-chrome/build/pgo_profiles/chrome-linux-5563-1678290224-135410b8b753e595e58a37622c311fffbbc64016.profdata
+chrome/build/pgo_profiles/chrome-linux-5615-1679995307-0baae343d55c36a01b20eb4c600fca3ba7e0825e.profdata
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/Network Share Test.lnk
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/New folder - Shortcut.lnk
 chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/long_name.lnk
@@ -212,6 +212,9 @@ components/test/data/paint_preview/PaintPreviewTestService/wikipedia/150869817BD
 components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03E9107A321304E21C0A644.skp
 components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
 components/test/data/printing/unsorted_custompapers.plist
+components/test/data/safe_browsing/client_model.pb
+components/test/data/safe_browsing/visual_model_android.tflite
+components/test/data/safe_browsing/visual_model_desktop.tflite
 components/test/data/segmentation_platform/adder.tflite
 components/test/data/service_worker/created_by_origin_impl/Database/000003.log
 components/test/data/service_worker/created_by_origin_impl/Database/MANIFEST-000001
@@ -3132,12 +3135,12 @@ third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_
 third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p1s3.nspv
 third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p1s4.nspv
 third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p2s0.nspv
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-a.mp4
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-b.mp4
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-c.mp4
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-d.mp4
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h264.mp4
-third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h265.mp4
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-a.h264
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-b.h264
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-c.h264
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-d.h265
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h264
+third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h265
 third_party/angle/third_party/glmark2/src/data/models/asteroid-high.3ds
 third_party/angle/third_party/glmark2/src/data/models/asteroid-low.3ds
 third_party/angle/third_party/glmark2/src/data/models/cat.3ds
@@ -8563,6 +8566,7 @@ third_party/crashpad/crashpad/snapshot/elf/elf_image_reader_fuzzer_corpus/ret42
 third_party/crashpad/crashpad/snapshot/ios/testdata/crash-1fa088dda0adb41459d063078a0f384a0bb8eefa
 third_party/crashpad/crashpad/snapshot/ios/testdata/crash-5726011582644224
 third_party/crashpad/crashpad/snapshot/ios/testdata/crash-6605504629637120
+third_party/crashpad/crashpad/snapshot/ios/testdata/crash-c44acfcbccd8c7a8
 third_party/crashpad/crashpad/util/net/testdata/binary_http_body.dat
 third_party/dawn/third_party/ninja/ninja
 third_party/dawn/third_party/webgpu-cts/deploy_key.enc
@@ -9628,9 +9632,6 @@ third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/r
 third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/rsa/__pycache__/randnum.cpython-38.pyc
 third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/rsa/__pycache__/transform.cpython-38.pyc
 third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/six/__pycache__/six.cpython-38.pyc
-third_party/depot_tools/ninja-linux64
-third_party/depot_tools/ninja-mac
-third_party/depot_tools/ninja.exe
 third_party/devtools-frontend/src/node_modules/tar-fs/test/fixtures/invalid.tar
 third_party/devtools-frontend/src/node_modules/terser/node_modules/source-map/lib/mappings.wasm
 third_party/devtools-frontend/src/test/e2e/resources/media/corrupt.webm
@@ -9648,15 +9649,6 @@ third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/syntax-highlig
 third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable.wasm
 third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable_with_dwarf.wasm
 third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/wasm-with-sourcemap.wasm
-third_party/devtools-frontend/src/test/screenshots/image_diff/linux/image_diff
-third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libbase.so
-third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libboringssl.so
-third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libc++.so
-third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libchrome_zlib.so
-third_party/devtools-frontend/src/test/screenshots/image_diff/mac/image_diff
-third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libbase.dylib
-third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libc++.dylib
-third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libchrome_zlib.dylib
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/animation.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/basic.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-cluster-max-duration.json.gz
@@ -9666,7 +9658,9 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-last-cluste
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-multiple-frames.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-single-frame.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/forced-layouts-and-no-gpu.json.gz
+third_party/devtools-frontend/src/test/unittests/fixtures/traces/generic-about-tracing-trace.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/interactive-time.json.gz
+third_party/devtools-frontend/src/test/unittests/fixtures/traces/invalidate-style-class-name-change.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-images.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-web-font.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/load-simple.json.gz
@@ -9684,10 +9678,23 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/reload-no-tti.j
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/request-with-query-param.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-button-click.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-keydown.json.gz
+third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-attribute.json.gz
+third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-id.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/threejs-gpu.json.gz
+third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings-complex.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings.json.gz
 third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev.json.gz
 third_party/devtools-frontend/src/third_party/esbuild/esbuild
+third_party/devtools-frontend/src/third_party/image_diff/linux/image_diff
+third_party/devtools-frontend/src/third_party/image_diff/linux/libbase.so
+third_party/devtools-frontend/src/third_party/image_diff/linux/libboringssl.so
+third_party/devtools-frontend/src/third_party/image_diff/linux/libc++.so
+third_party/devtools-frontend/src/third_party/image_diff/linux/libchrome_zlib.so
+third_party/devtools-frontend/src/third_party/image_diff/mac/image_diff
+third_party/devtools-frontend/src/third_party/image_diff/mac/libbase.dylib
+third_party/devtools-frontend/src/third_party/image_diff/mac/libc++.dylib
+third_party/devtools-frontend/src/third_party/image_diff/mac/libchrome_zlib.dylib
+third_party/devtools-frontend/src/third_party/image_diff/win32/image_diff.exe
 third_party/ffmpeg/tests/reference.pnm
 third_party/flatbuffers/src/android/gradle/wrapper/gradle-wrapper.jar
 third_party/flatbuffers/src/dart/test/monsterdata_test.mon
@@ -9722,7 +9729,6 @@ third_party/flatbuffers/src/tests/annotated_binary/tests/invalid_vtable_size_sho
 third_party/flatbuffers/src/tests/arrays_test.bfbs
 third_party/flatbuffers/src/tests/gold_flexbuffer_example.bin
 third_party/flatbuffers/src/tests/javatest.bin
-third_party/flatbuffers/src/tests/monster_test.afb
 third_party/flatbuffers/src/tests/monster_test.bfbs
 third_party/flatbuffers/src/tests/monsterdata_go_wire.mon.sp
 third_party/flatbuffers/src/tests/monsterdata_python_wire.mon
@@ -13050,16 +13056,19 @@ third_party/hunspell/fuzz/bdict_corpus/en-US-7-1.bdic
 third_party/hunspell/fuzz/bdict_corpus/en-US-8-0.bdic
 third_party/hunspell/fuzz/bdict_corpus/f95048cdc0fc231dd712bad106578a9eeecd869b
 third_party/hunspell/fuzz/bdict_corpus/fda69541054125551c41ab3e591e0482405ca2dc
+third_party/hyphenation-patterns/hyb/hyph-af.hyb
 third_party/hyphenation-patterns/hyb/hyph-as.hyb
 third_party/hyphenation-patterns/hyb/hyph-be.hyb
 third_party/hyphenation-patterns/hyb/hyph-bg.hyb
 third_party/hyphenation-patterns/hyb/hyph-bn.hyb
+third_party/hyphenation-patterns/hyb/hyph-cs.hyb
 third_party/hyphenation-patterns/hyb/hyph-cu.hyb
 third_party/hyphenation-patterns/hyb/hyph-cy.hyb
 third_party/hyphenation-patterns/hyb/hyph-da.hyb
 third_party/hyphenation-patterns/hyb/hyph-de-1901.hyb
 third_party/hyphenation-patterns/hyb/hyph-de-1996.hyb
 third_party/hyphenation-patterns/hyb/hyph-de-ch-1901.hyb
+third_party/hyphenation-patterns/hyb/hyph-el.hyb
 third_party/hyphenation-patterns/hyb/hyph-en-gb.hyb
 third_party/hyphenation-patterns/hyb/hyph-en-us.hyb
 third_party/hyphenation-patterns/hyb/hyph-es.hyb
@@ -13067,25 +13076,37 @@ third_party/hyphenation-patterns/hyb/hyph-et.hyb
 third_party/hyphenation-patterns/hyb/hyph-eu.hyb
 third_party/hyphenation-patterns/hyb/hyph-fr.hyb
 third_party/hyphenation-patterns/hyb/hyph-ga.hyb
+third_party/hyphenation-patterns/hyb/hyph-gl.hyb
 third_party/hyphenation-patterns/hyb/hyph-gu.hyb
 third_party/hyphenation-patterns/hyb/hyph-hi.hyb
 third_party/hyphenation-patterns/hyb/hyph-hr.hyb
 third_party/hyphenation-patterns/hyb/hyph-hu.hyb
 third_party/hyphenation-patterns/hyb/hyph-hy.hyb
+third_party/hyphenation-patterns/hyb/hyph-it.hyb
+third_party/hyphenation-patterns/hyb/hyph-ka.hyb
 third_party/hyphenation-patterns/hyb/hyph-kn.hyb
 third_party/hyphenation-patterns/hyb/hyph-la.hyb
+third_party/hyphenation-patterns/hyb/hyph-lt.hyb
+third_party/hyphenation-patterns/hyb/hyph-lv.hyb
 third_party/hyphenation-patterns/hyb/hyph-ml.hyb
 third_party/hyphenation-patterns/hyb/hyph-mn-cyrl.hyb
 third_party/hyphenation-patterns/hyb/hyph-mr.hyb
+third_party/hyphenation-patterns/hyb/hyph-mul-ethi.hyb
 third_party/hyphenation-patterns/hyb/hyph-nb.hyb
+third_party/hyphenation-patterns/hyb/hyph-nl.hyb
 third_party/hyphenation-patterns/hyb/hyph-nn.hyb
 third_party/hyphenation-patterns/hyb/hyph-or.hyb
 third_party/hyphenation-patterns/hyb/hyph-pa.hyb
 third_party/hyphenation-patterns/hyb/hyph-pt.hyb
+third_party/hyphenation-patterns/hyb/hyph-ru.hyb
+third_party/hyphenation-patterns/hyb/hyph-sk.hyb
 third_party/hyphenation-patterns/hyb/hyph-sl.hyb
+third_party/hyphenation-patterns/hyb/hyph-sq.hyb
+third_party/hyphenation-patterns/hyb/hyph-sv.hyb
 third_party/hyphenation-patterns/hyb/hyph-ta.hyb
 third_party/hyphenation-patterns/hyb/hyph-te.hyb
 third_party/hyphenation-patterns/hyb/hyph-tk.hyb
+third_party/hyphenation-patterns/hyb/hyph-uk.hyb
 third_party/hyphenation-patterns/hyb/hyph-und-ethi.hyb
 third_party/icu/cast/icudtl.dat
 third_party/icu/chromeos/icudtl.dat
@@ -16059,6 +16080,7 @@ third_party/llvm/llvm/test/Bitcode/visibility-styles.3.2.ll.bc
 third_party/llvm/llvm/test/Bitcode/weak-cmpxchg-upgrade.ll.bc
 third_party/llvm/llvm/test/Bitcode/weak-macho-3.5.ll.bc
 third_party/llvm/llvm/test/DebugInfo/Inputs/.build-id/ab/b50d82b6bdc861.debug
+third_party/llvm/llvm/test/DebugInfo/Inputs/accel-imported-declaration.macho-arm64.o
 third_party/llvm/llvm/test/DebugInfo/Inputs/arange-overlap.elf-x86_64
 third_party/llvm/llvm/test/DebugInfo/Inputs/arm-relocs.elf-arm
 third_party/llvm/llvm/test/DebugInfo/Inputs/cross-cu-inlining.x86_64-macho.o
@@ -16401,6 +16423,8 @@ third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/uniqname.suffix.afdo
 third_party/llvm/llvm/test/Verifier/non-integer-gep-index.ll.bc
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/absolute_sym.macho.i386
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/absolute_sym.macho.i386.o
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/accel-imported-declaration.macho-arm64
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/accel-imported-declaration.macho-arm64.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/bar.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/foo.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/foobar
@@ -16416,6 +16440,7 @@ third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic1.macho.x86_64.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic2-custom-linetable.macho.x86_64.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic2.macho.x86_64.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic3.macho.x86_64.o
+third_party/llvm/llvm/test/tools/dsymutil/Inputs/call-dwarf5.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/common.macho.x86_64
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/common.macho.x86_64.o
 third_party/llvm/llvm/test/tools/dsymutil/Inputs/dead-stripped/1.o
@@ -17291,7 +17316,6 @@ third_party/nasm/travis/test/xcrypt.bin.t
 third_party/nasm/travis/test/zerobyte.bin.t
 third_party/ninja/ninja
 third_party/node/node_modules.tar.gz
-third_party/node/node_modules/terser/node_modules/source-map/lib/mappings.wasm
 third_party/openh264/src/autotest/performanceTest/ios/fruitstrap
 third_party/openh264/src/autotest/performanceTest/ios/iFileTransfer
 third_party/openh264/src/res/Adobe_PDF_sample_a_1024x768_50Frms.264
@@ -17803,6 +17827,7 @@ third_party/tflite/src/tensorflow/cc/saved_model/testdata/x_plus_y_v2_debuginfo/
 third_party/tflite/src/tensorflow/cc/saved_model/testdata/x_plus_y_v2_debuginfo/variables/variables.index
 third_party/tflite/src/tensorflow/compiler/aot/codegen_test_o.golden
 third_party/tflite/src/tensorflow/compiler/jit/tests/opens2s_gnmt_mixed_precision.pbtxt.gz
+third_party/tflite/src/tensorflow/compiler/xla/mlir/tools/mlir_bisect/tests/snapshot.mlir.pb
 third_party/tflite/src/tensorflow/core/graph/regularization/testdata/bert1/saved_model.pb
 third_party/tflite/src/tensorflow/core/graph/regularization/testdata/bert2/saved_model.pb
 third_party/tflite/src/tensorflow/core/ir/importexport/tests/saved_model/savedmodel_v1/saved_model.pb

Some files were not shown because too many files changed in this diff