Date: Monday, May 4, 2020 @ 16:37:50 Author: heftig Revision: 382219 76.0-1
Modified: firefox/trunk/PKGBUILD Deleted: firefox/trunk/0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch -----------------------------------------------------------------+ 0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch | 35 ---------- PKGBUILD | 11 --- 2 files changed, 3 insertions(+), 43 deletions(-) Deleted: 0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch =================================================================== --- 0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch 2020-05-04 16:37:48 UTC (rev 382218) +++ 0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch 2020-05-04 16:37:50 UTC (rev 382219) @@ -1,35 +0,0 @@ -From 0447215abf836bbb8eef53aeccf029dd40bd1a52 Mon Sep 17 00:00:00 2001 -From: Jeff Gilbert <[email protected]> -Date: Sun, 12 Apr 2020 21:21:32 +0000 -Subject: [PATCH] Bug 1623885 - Add "subsystem" to Mesa sandbox policy to fix - libdrm-2.4.101+. r=gcp, a=RyanVM - -Differential Revision: https://phabricator.services.mozilla.com/D70579 ---- - .../linux/broker/SandboxBrokerPolicyFactory.cpp | 10 ++++++---- - 1 file changed, 6 insertions(+), 4 deletions(-) - -diff --git a/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp b/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp -index 3aa7cf27e353..0b3948ebd92e 100644 ---- a/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp -+++ b/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp -@@ -86,10 +86,12 @@ static void AddMesaSysfsPaths(SandboxBroker::Policy* aPolicy) { - // broker. To match this, allow the canonical paths. - UniqueFreePtr<char[]> realSysPath(realpath(sysPath.get(), nullptr)); - if (realSysPath) { -- static const Array<const char*, 7> kMesaAttrSuffixes = { -- "revision", "vendor", "device", "subsystem_vendor", -- "subsystem_device", "uevent", "config"}; -- for (const auto attrSuffix : kMesaAttrSuffixes) { -+ constexpr const char* kMesaAttrSuffixes[] = { -+ "config", "device", "revision", -+ "subsystem", "subsystem_device", "subsystem_vendor", -+ "uevent", "vendor", -+ }; -+ for (const auto& attrSuffix : kMesaAttrSuffixes) { - nsPrintfCString attrPath("%s/%s", realSysPath.get(), - attrSuffix); - aPolicy->AddPath(rdonly, attrPath.get()); --- -2.26.2 - Modified: PKGBUILD =================================================================== --- PKGBUILD 2020-05-04 16:37:48 UTC (rev 382218) +++ PKGBUILD 2020-05-04 16:37:50 UTC (rev 382219) @@ -3,8 +3,8 @@ # Contributor: Jakub Schmidtke <[email protected]> pkgname=firefox -pkgver=75.0 -pkgrel=2 +pkgver=76.0 +pkgrel=1 pkgdesc="Standalone web browser from mozilla.org" arch=(x86_64) license=(MPL GPL LGPL) @@ -21,12 +21,10 @@ 'hunspell-en_US: Spell checking, American English') options=(!emptydirs !makeflags !strip) source=(https://archive.mozilla.org/pub/firefox/releases/$pkgver/source/firefox-$pkgver.source.tar.xz{,.asc} - 0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch 0001-Use-remoting-name-for-GDK-application-names.patch $pkgname.desktop) -sha256sums=('bbb1054d8f2717c634480556d3753a8483986af7360e023bb6232df80b746b0f' +sha256sums=('3b7b97b0b0625fc6ec23ee28d425988c679d3a56f362d62fd3b225a5d50afdc8' 'SKIP' - 'ebb169804750ddc10a4801ed6ddb37356331bbf76615f58eb29de2e6e15ee930' '5f7ac724a5c5afd9322b1e59006f4170ea5354ca1e0e60dab08b7784c2d8463c' '298eae9de76ec53182f38d5c549d0379569916eebf62149f9d7f4a7edef36abf') validpgpkeys=('14F26682D0916CDD81E37B6D61B7B526D98F0353') # Mozilla Software Releases <[email protected]> @@ -47,9 +45,6 @@ mkdir mozbuild cd firefox-$pkgver - # https://bugs.archlinux.org/task/66185 - patch -Np1 -i ../0001-Bug-1623885-Add-subsystem-to-Mesa-sandbox-policy-to-.patch - # https://bugzilla.mozilla.org/show_bug.cgi?id=1530052 patch -Np1 -i ../0001-Use-remoting-name-for-GDK-application-names.patch
