diff options
author | tensor5 | 2022-02-18 19:59:47 +0000 |
---|---|---|
committer | svntogit | 2022-02-18 19:59:47 +0000 |
commit | b497cc31344d723c84ed0e11d53aff4e2c3d7b95 (patch) | |
tree | a4224eab30aebaf74f758acbd81380bac842096b /sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch | |
parent | baf6518f497381f40be357c4cab76fb5d72f6555 (diff) | |
download | aur-b497cc31344d723c84ed0e11d53aff4e2c3d7b95.tar.gz |
upgpkg: electron14 14.2.6-1
git-svn-id: file:///srv/repos/svn-community/svn@1134169 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Diffstat (limited to 'sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch')
-rw-r--r-- | sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch b/sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch new file mode 100644 index 000000000000..2b4391fdeb50 --- /dev/null +++ b/sandbox-build-if-glibc-2.34-dynamic-stack-size-is-en.patch @@ -0,0 +1,39 @@ +From 28ac6a15411d01301e171b8a8b0019abd57589b9 Mon Sep 17 00:00:00 2001 +From: Stephan Hartmann <stha09@googlemail.com> +Date: Mon, 7 Feb 2022 20:09:57 +0000 +Subject: [PATCH] sandbox: build if glibc 2.34+ dynamic stack size is enabled +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Compilation of sandbox fails when using dynamic stack size in glibc +2.34 or newer. This is because the value is not a literal anymore but +obtained through sysconf. + +To avoid this, use memset to put zeros in the buffer. + +Change-Id: Ia479e0f799b77a10a00197aaaa0500e62546f458 +Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/3436947 +Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> +Commit-Queue: José Dapena Paz <jdapena@igalia.com> +Cr-Commit-Position: refs/heads/main@{#967943} +--- + sandbox/linux/services/credentials.cc | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/sandbox/linux/services/credentials.cc b/sandbox/linux/services/credentials.cc +index ca6b5954798..c933eafd163 100644 +--- a/sandbox/linux/services/credentials.cc ++++ b/sandbox/linux/services/credentials.cc +@@ -100,7 +100,10 @@ bool ChrootToSafeEmptyDir() { + // TODO(crbug.com/1247458) Broken in MSan builds after LLVM f1bb30a4956f. + clone_flags |= CLONE_VM | CLONE_VFORK | CLONE_SETTLS; + +- char tls_buf[PTHREAD_STACK_MIN] = {0}; ++ // PTHREAD_STACK_MIN can be dynamic in glibc2.34+, so it is not possible to ++ // zeroify tls_buf assigning { 0 } ++ char tls_buf[PTHREAD_STACK_MIN]; ++ memset(tls_buf, 0, PTHREAD_STACK_MIN); + tls = tls_buf; + #endif + |