summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorMaxim Baz2019-05-03 18:36:20 +0200
committerMaxim Baz2019-05-03 18:36:20 +0200
commit94f7e81732ed473bcb0342eb777c8451ac50bd3e (patch)
tree651aa60e97202efbcfa3571ecc8f11128bede36f
parent15c41f2b76c78f63acf86981f032a32f9c7ccd89 (diff)
downloadaur-94f7e81732ed473bcb0342eb777c8451ac50bd3e.tar.gz
chromium-vaapi: 74.0.3729.131
-rw-r--r--.SRCINFO8
-rw-r--r--PKGBUILD6
-rw-r--r--chromium-glibc-2.29.patch29
3 files changed, 25 insertions, 18 deletions
diff --git a/.SRCINFO b/.SRCINFO
index 6356dccc45dc..2d0c4d4cb97d 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,6 +1,6 @@
pkgbase = chromium-vaapi
pkgdesc = Chromium with VA-API support to enable hardware acceleration
- pkgver = 74.0.3729.108
+ pkgver = 74.0.3729.131
pkgrel = 1
url = https://www.chromium.org/Home
install = chromium.install
@@ -55,7 +55,7 @@ pkgbase = chromium-vaapi
optdepends = kwallet: for storing passwords in KWallet
provides = chromium
conflicts = chromium
- source = https://commondatastorage.googleapis.com/chromium-browser-official/chromium-74.0.3729.108.tar.xz
+ source = https://commondatastorage.googleapis.com/chromium-browser-official/chromium-74.0.3729.131.tar.xz
source = chromium-launcher-6.tar.gz::https://github.com/foutrelis/chromium-launcher/archive/v6.tar.gz
source = chromium-drirc-disable-10bpc-color-configs.conf
source = chromium-vaapi.patch
@@ -63,12 +63,12 @@ pkgbase = chromium-vaapi
source = chromium-glibc-2.29.patch
source = chromium-widevine.patch
source = chromium-skia-harmony.patch
- sha256sums = 1e1e5e06fe24309377630800b44b5c6b624b7c722b5d9789abe80a962b945b6f
+ sha256sums = d178c7842f8f858ac876d88ce866cbd2132d7ca6c73940613ebf7e9c3fada986
sha256sums = 04917e3cd4307d8e31bfb0027a5dce6d086edb10ff8a716024fbb8bb0c7dccf1
sha256sums = babda4f5c1179825797496898d77334ac067149cac03d797ab27ac69671a7feb
sha256sums = e87ede45edf39ac19e56ac1ae49c9d1f5f5130e5838bcbb4c3d4fb16e55575c0
sha256sums = e2d284311f49c529ea45083438a768db390bde52949995534034d2a814beab89
- sha256sums = 89ca1ac8394ec0920357ff64ba46573e978e9be64f82aa0fc225b36e30d5842c
+ sha256sums = dd791f154b48e69cd47fd94753c45448655b529590995fd71ac1591c53a3d60c
sha256sums = d081f2ef8793544685aad35dea75a7e6264a2cb987ff3541e6377f4a3650a28b
sha256sums = 5887f78b55c4ecbbcba5930f3f0bb7bc0117c2a41c2f761805fcf7f46f1ca2b3
diff --git a/PKGBUILD b/PKGBUILD
index 4afd144303ed..01217da15040 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -10,7 +10,7 @@
# Contributor: Daniel J Griffiths <ghost1227@archlinux.us>
pkgname=chromium-vaapi
-pkgver=74.0.3729.108
+pkgver=74.0.3729.131
pkgrel=1
_launcher_ver=6
pkgdesc="Chromium with VA-API support to enable hardware acceleration"
@@ -37,12 +37,12 @@ source=(https://commondatastorage.googleapis.com/chromium-browser-official/chrom
chromium-glibc-2.29.patch
chromium-widevine.patch
chromium-skia-harmony.patch)
-sha256sums=('1e1e5e06fe24309377630800b44b5c6b624b7c722b5d9789abe80a962b945b6f'
+sha256sums=('d178c7842f8f858ac876d88ce866cbd2132d7ca6c73940613ebf7e9c3fada986'
'04917e3cd4307d8e31bfb0027a5dce6d086edb10ff8a716024fbb8bb0c7dccf1'
'babda4f5c1179825797496898d77334ac067149cac03d797ab27ac69671a7feb'
'e87ede45edf39ac19e56ac1ae49c9d1f5f5130e5838bcbb4c3d4fb16e55575c0'
'e2d284311f49c529ea45083438a768db390bde52949995534034d2a814beab89'
- '89ca1ac8394ec0920357ff64ba46573e978e9be64f82aa0fc225b36e30d5842c'
+ 'dd791f154b48e69cd47fd94753c45448655b529590995fd71ac1591c53a3d60c'
'd081f2ef8793544685aad35dea75a7e6264a2cb987ff3541e6377f4a3650a28b'
'5887f78b55c4ecbbcba5930f3f0bb7bc0117c2a41c2f761805fcf7f46f1ca2b3')
diff --git a/chromium-glibc-2.29.patch b/chromium-glibc-2.29.patch
index 5b00aadbddd0..11d9cb9a31a7 100644
--- a/chromium-glibc-2.29.patch
+++ b/chromium-glibc-2.29.patch
@@ -1,9 +1,8 @@
-tree 0f4b37852646eae176de06a5d92cd2f68ffaf318
-parent a38dc4152f043e81310b0deff46f9a770b9f5fcb
-author Matthew Denton <mpdenton@chromium.org> 1555962368 -0700
-committer Matthew Denton <mpdenton@chromium.org> 1555962368 -0700
-
-Update Linux Seccomp syscall restrictions to EPERM posix_spawn/vfork
+From 65046b8f90d0336cbe5f2f15cc7da5cb798360ad Mon Sep 17 00:00:00 2001
+From: Matthew Denton <mpdenton@chromium.org>
+Date: Wed, 24 Apr 2019 15:44:40 +0000
+Subject: [PATCH] Update Linux Seccomp syscall restrictions to EPERM
+ posix_spawn/vfork
Glibc's system() function switched to using posix_spawn, which uses
CLONE_VFORK. Pepperflash includes a sandbox debugging check which
@@ -15,9 +14,17 @@ CLONE_VFORK and CLONE_VM.
Bug: 949312
Change-Id: I3f4b90114b2fc1d9929e3c0a85bbe8f10def3c20
+Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1568086
+Commit-Queue: Robert Sesek <rsesek@chromium.org>
+Reviewed-by: Robert Sesek <rsesek@chromium.org>
+Cr-Commit-Position: refs/heads/master@{#653590}
+---
+ .../baseline_policy_unittest.cc | 29 +++++++++++++++++++
+ .../syscall_parameters_restrictions.cc | 13 +++++++--
+ 2 files changed, 40 insertions(+), 2 deletions(-)
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc
-index cdeb210..40fcebf 100644
+index cdeb210ccb..40fcebf933 100644
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc
@@ -10,7 +10,9 @@
@@ -30,7 +37,7 @@ index cdeb210..40fcebf 100644
#include <sys/prctl.h>
#include <sys/resource.h>
#include <sys/socket.h>
-@@ -130,6 +132,33 @@
+@@ -130,6 +132,33 @@ BPF_TEST_C(BaselinePolicy, ForkArmEperm, BaselinePolicy) {
BPF_ASSERT_EQ(EPERM, fork_errno);
}
@@ -65,10 +72,10 @@ index cdeb210..40fcebf 100644
base::Thread thread("sandbox_tests");
BPF_ASSERT(thread.Start());
diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc
-index 100afe5..348ab6e 100644
+index 100afe50e3..348ab6e8c5 100644
--- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc
+++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc
-@@ -135,7 +135,8 @@
+@@ -135,7 +135,8 @@ namespace sandbox {
#if !defined(OS_NACL_NONSFI)
// Allow Glibc's and Android pthread creation flags, crash on any other
// thread creation attempts and EPERM attempts to use neither
@@ -78,7 +85,7 @@ index 100afe5..348ab6e 100644
ResultExpr RestrictCloneToThreadsAndEPERMFork() {
const Arg<unsigned long> flags(0);
-@@ -154,8 +155,16 @@
+@@ -154,8 +155,16 @@ ResultExpr RestrictCloneToThreadsAndEPERMFork() {
AnyOf(flags == kAndroidCloneMask, flags == kObsoleteAndroidCloneMask,
flags == kGlibcPthreadFlags);