--- a/mozilla-fix-top-level-asm.patch Sun Aug 27 10:23:20 2023 +0200
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,68 +0,0 @@
-From 91bb79836ee274855393bdf6ab10e24899b1b349 Mon Sep 17 00:00:00 2001
-From: Martin Liska <mliska@suse.cz>
-Date: Fri, 17 May 2019 14:41:35 +0200
-Subject: [PATCH] Fix top-level asm issue.
-
----
- security/sandbox/linux/moz.build | 5 ++++-
- 1 file changed, 4 insertions(+), 1 deletion(-)
-
-diff --git a/security/sandbox/linux/moz.build b/security/sandbox/linux/moz.build
---- a/security/sandbox/linux/moz.build
-+++ b/security/sandbox/linux/moz.build
-@@ -64,17 +64,16 @@ UNIFIED_SOURCES += [
- "../chromium/base/time/time.cc",
- "../chromium/base/time/time_exploded_posix.cc",
- "../chromium/base/time/time_now_posix.cc",
- "../chromium/sandbox/linux/bpf_dsl/bpf_dsl.cc",
- "../chromium/sandbox/linux/bpf_dsl/codegen.cc",
- "../chromium/sandbox/linux/bpf_dsl/dump_bpf.cc",
- "../chromium/sandbox/linux/bpf_dsl/policy.cc",
- "../chromium/sandbox/linux/bpf_dsl/policy_compiler.cc",
-- "../chromium/sandbox/linux/bpf_dsl/syscall_set.cc",
- "../chromium/sandbox/linux/seccomp-bpf/die.cc",
- "../chromium/sandbox/linux/seccomp-bpf/syscall.cc",
- "/ipc/glue/UtilityProcessSandboxing.cpp",
- "broker/SandboxBrokerCommon.cpp",
- "Sandbox.cpp",
- "SandboxBrokerClient.cpp",
- "SandboxFilter.cpp",
- "SandboxFilterUtil.cpp",
-@@ -83,16 +82,17 @@ UNIFIED_SOURCES += [
- "SandboxLogging.cpp",
- "SandboxOpenedFiles.cpp",
- "SandboxReporterClient.cpp",
- ]
-
- SOURCES += [
- "../chromium/base/strings/safe_sprintf.cc",
- "../chromium/base/third_party/icu/icu_utf.cc",
-+ "../chromium/sandbox/linux/bpf_dsl/syscall_set.cc",
- "../chromium/sandbox/linux/seccomp-bpf/trap.cc",
- "../chromium/sandbox/linux/services/syscall_wrappers.cc",
- ]
-
- # This copy of SafeSPrintf doesn't need to avoid the Chromium logging
- # dependency like the one in libxul does, but this way the behavior is
- # consistent. See also the comment in SandboxLogging.h.
- SOURCES["../chromium/base/strings/safe_sprintf.cc"].flags += ["-DNDEBUG"]
-@@ -106,16 +106,19 @@ if CONFIG["CC_TYPE"] in ("clang", "gcc")
- "-Wno-unreachable-code-return"
- ]
-
- if CONFIG["CC_TYPE"] in ("clang", "gcc"):
- CXXFLAGS += ["-Wno-error=stack-protector"]
- SOURCES["../chromium/sandbox/linux/services/syscall_wrappers.cc"].flags += [
- "-Wno-empty-body",
- ]
-+ SOURCES['../chromium/sandbox/linux/seccomp-bpf/syscall.cc'].flags += [
-+ '-fno-lto'
-+ ]
-
- # gcc lto likes to put the top level asm in syscall.cc in a different partition
- # from the function using it which breaks the build. Work around that by
- # forcing there to be only one partition.
- for f in CONFIG["OS_CXXFLAGS"]:
- if f.startswith("-flto") and CONFIG["CC_TYPE"] != "clang":
- LDFLAGS += ["--param lto-partitions=1"]
-