aboutsummaryrefslogtreecommitdiffstats
path: root/community/chromium/secure_getenv.patch
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2017-08-08 13:34:16 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2017-09-15 13:37:11 +0000
commitd183e852a762296b473c33e9ce106f52a4359dae (patch)
tree2f92f891d7ff1fc4b4aa0551bd7b28218b30b9d3 /community/chromium/secure_getenv.patch
parent0d4667363c89e53a83538d90acdc612739d061db (diff)
downloadaports-d183e852a762296b473c33e9ce106f52a4359dae.tar.bz2
aports-d183e852a762296b473c33e9ce106f52a4359dae.tar.xz
community/chromium: upgrade to 61.0.3163.79
to fix tab crashes, use patch from https://github.com/lluixhi/musl-extras/issues/10#issuecomment-328272349 use various patches from fedora
Diffstat (limited to 'community/chromium/secure_getenv.patch')
-rw-r--r--community/chromium/secure_getenv.patch38
1 files changed, 38 insertions, 0 deletions
diff --git a/community/chromium/secure_getenv.patch b/community/chromium/secure_getenv.patch
new file mode 100644
index 0000000000..b28b77ef79
--- /dev/null
+++ b/community/chromium/secure_getenv.patch
@@ -0,0 +1,38 @@
+diff --git a/third_party/angle/src/vulkan_support/BUILD.gn b/third_party/angle/src/vulkan_support/BUILD.gn
+index 51c8c10..fb70649 100644
+--- third_party/angle/src/vulkan_support/BUILD.gn
++++ third_party/angle/src/vulkan_support/BUILD.gn
+@@ -204,8 +204,8 @@ config("vulkan_loader_config") {
+ cflags = [ "/wd4201" ]
+ }
+ if (is_linux) {
+- # assume secure_getenv() is available
+- defines += [ "HAVE_SECURE_GETENV" ]
++ # assume getauxval() is available
++ defines += [ "HAVE_GETAUXVAL" ]
+ }
+ }
+
+diff --git a/third_party/vulkan-validation-layers/src/loader/loader.c b/third_party/vulkan-validation-layers/src/loader/loader.c
+index facddc1..b6a8ee9 100644
+--- third_party/vulkan-validation-layers/src/loader/loader.c
++++ third_party/vulkan-validation-layers/src/loader/loader.c
+@@ -31,6 +31,9 @@
+ #include <stdbool.h>
+ #include <string.h>
+ #include <stddef.h>
++#if defined(HAVE_GETAUXVAL)
++#include <sys/auxv.h>
++#endif
+
+ #include <sys/types.h>
+ #if defined(_WIN32)
+@@ -218,6 +221,8 @@ static inline char *loader_secure_getenv(const char *name, const struct loader_i
+ return secure_getenv(name);
+ #elif defined(HAVE___SECURE_GETENV)
+ return __secure_getenv(name);
++#elif defined(HAVE_GETAUXVAL)
++ return getauxval(AT_SECURE) ? NULL : getenv(name);
+ #else
+ #pragma message("Warning: Falling back to non-secure getenv for environmental lookups! Consider" \
+ " updating to a different libc.")