From 2415a3c94f322bf84d310cf985b6e6081683ff92 Mon Sep 17 00:00:00 2001 From: Stephan Hartmann Date: Sat, 20 Nov 2021 11:08:00 +0100 Subject: www-client/chromium: add workaround for sandbox with glibc-2.34 Bug: https://bugs.gentoo.org/823857 Package-Manager: Portage-3.0.28, Repoman-3.0.3 Signed-off-by: Stephan Hartmann --- .../chromium/files/chromium-glibc-2.34.patch | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) (limited to 'www-client') diff --git a/www-client/chromium/files/chromium-glibc-2.34.patch b/www-client/chromium/files/chromium-glibc-2.34.patch index 0cb85b2ca516..64c03a6adae6 100644 --- a/www-client/chromium/files/chromium-glibc-2.34.patch +++ b/www-client/chromium/files/chromium-glibc-2.34.patch @@ -26,3 +26,25 @@ index ca353c4..5cdabcf 100644 // Only set an alternative stack if there isn't already one, or if the current // one is too small. +diff --git a/sandbox/linux/services/credentials.cc b/sandbox/linux/services/credentials.cc +index ca6b595..1c1ee42 100644 +--- a/sandbox/linux/services/credentials.cc ++++ b/sandbox/linux/services/credentials.cc +@@ -11,6 +11,7 @@ + #include + #include + #include ++#include + #include + #include + #include +@@ -100,7 +101,8 @@ bool ChrootToSafeEmptyDir() { + // TODO(crbug.com/1247458) Broken in MSan builds after LLVM f1bb30a4956f. + clone_flags |= CLONE_VM | CLONE_VFORK | CLONE_SETTLS; + +- char tls_buf[PTHREAD_STACK_MIN] = {0}; ++ char tls_buf[PTHREAD_STACK_MIN]; ++ memset(tls_buf, 0, PTHREAD_STACK_MIN); + tls = tls_buf; + #endif + -- cgit v1.2.3-65-gdbad