diff options
Diffstat (limited to 'www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc')
-rw-r--r-- | www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc b/www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc index d88bbd639fa0..676cf1b86c8d 100644 --- a/www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc +++ b/www/ungoogled-chromium/files/patch-base_debug_stack__trace__posix.cc @@ -1,4 +1,4 @@ ---- base/debug/stack_trace_posix.cc.orig 2025-03-09 21:38:10 UTC +--- base/debug/stack_trace_posix.cc.orig 2025-09-10 13:22:16 UTC +++ base/debug/stack_trace_posix.cc @@ -51,7 +51,7 @@ // execinfo.h and backtrace(3) are really only present in glibc and in macOS @@ -21,7 +21,7 @@ #include "base/debug/proc_maps_linux.h" #endif -@@ -329,7 +331,7 @@ void PrintToStderr(const char* output) { +@@ -327,7 +329,7 @@ void PrintToStderr(const char* output) { std::ignore = HANDLE_EINTR(write(STDERR_FILENO, output, strlen(output))); } @@ -30,7 +30,7 @@ void AlarmSignalHandler(int signal, siginfo_t* info, void* void_context) { // We have seen rare cases on AMD linux where the default signal handler // either does not run or a thread (Probably an AMD driver thread) prevents -@@ -346,7 +348,11 @@ void AlarmSignalHandler(int signal, siginfo_t* info, v +@@ -344,7 +346,11 @@ void AlarmSignalHandler(int signal, siginfo_t* info, v "Warning: Default signal handler failed to terminate process.\n"); PrintToStderr("Calling exit_group() directly to prevent timeout.\n"); // See: https://man7.org/linux/man-pages/man2/exit_group.2.html @@ -42,7 +42,7 @@ } #endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || // BUILDFLAG(IS_CHROMEOS) -@@ -552,7 +558,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf +@@ -548,7 +554,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf _exit(EXIT_FAILURE); } @@ -51,7 +51,7 @@ // Set an alarm to trigger in case the default handler does not terminate // the process. See 'AlarmSignalHandler' for more details. struct sigaction action; -@@ -577,6 +583,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf +@@ -573,6 +579,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf // signals that do not re-raise autonomously), such as signals delivered via // kill() and asynchronous hardware faults such as SEGV_MTEAERR, which would // otherwise be lost when re-raising the signal via raise(). @@ -59,7 +59,7 @@ long retval = syscall(SYS_rt_tgsigqueueinfo, getpid(), syscall(SYS_gettid), info->si_signo, info); if (retval == 0) { -@@ -591,6 +598,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf +@@ -587,6 +594,7 @@ void StackDumpSignalHandler(int signal, siginfo_t* inf if (errno != EPERM) { _exit(EXIT_FAILURE); } @@ -67,7 +67,7 @@ #endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID) || // BUILDFLAG(IS_CHROMEOS) -@@ -783,6 +791,7 @@ class SandboxSymbolizeHelper { +@@ -779,6 +787,7 @@ class SandboxSymbolizeHelper { return -1; } @@ -75,7 +75,7 @@ // This class is copied from // third_party/crashpad/crashpad/util/linux/scoped_pr_set_dumpable.h. // It aims at ensuring the process is dumpable before opening /proc/self/mem. -@@ -875,11 +884,15 @@ class SandboxSymbolizeHelper { +@@ -871,11 +880,15 @@ class SandboxSymbolizeHelper { r.base = cur_base; } } @@ -91,7 +91,7 @@ // Reads /proc/self/maps. std::string contents; if (!ReadProcMaps(&contents)) { -@@ -897,6 +910,7 @@ class SandboxSymbolizeHelper { +@@ -893,6 +906,7 @@ class SandboxSymbolizeHelper { is_initialized_ = true; return true; |