--- /dev/null
+diff --git a/glib/gutils.c b/glib/gutils.c
+index 4bccd7229..c983e71c3 100644
+--- a/glib/gutils.c
++++ b/glib/gutils.c
+@@ -3011,7 +3011,24 @@ g_check_setuid (void)
+ value = getauxval (AT_SECURE);
+ errsv = errno;
+ if (errsv)
+- g_error ("getauxval () failed: %s", g_strerror (errsv));
++ {
++/*
++ Apparently, Tizen is built with qemu version < 2.12.
++
++ qemu 2.12 introduces providing AT_SECURE in auxiliary vector,
++ and the only purpose of using getauxval in glib is to get AT_SECURE.
++
++ If g_check_setuid() bails out with error, some packages may not build,
++ as their building process requires executing tools that call g_check_setuid().
++
++ So, don't bail out with error if getauxval(AT_SECURE) fails.
++ Instead, set the result of checking suid to FALSE (no suid).
++
++ It may be reverted if all the builds are made within qemu >= 2.12.
++*/
++/* g_error ("getauxval () failed: %s", g_strerror (errsv));*/
++ return FALSE;
++ }
+ return value;
+ #elif defined(HAVE_ISSETUGID) && !defined(__BIONIC__)
+ /* BSD: http://www.freebsd.org/cgi/man.cgi?query=issetugid&sektion=2 */
Source7: gtk-doc.m4
Source8: LICENSE.MIT
Source99: baselibs.conf
+Source101: fix_getauxval_error_at_qemu.patch
Source200: kdbus1.patch
Source201: kdbus2.patch
Source1001: glib2.manifest
%prep
%setup -q -n %{name}-%{version}
+%{__patch} -p1 < %{SOURCE101}
%build
cp %{SOURCE3} .