4d98df5567
http://www.mozilla.org/security/known-vulnerabilities/firefox36.html The new plugin sandboxing code is disabled because : - it only supports binary blobs plugins we don't have - it is an horrible maze of #ifdef linux-apple-win32 coming straight from an old version of chromium. Future versions should have better BSD support.. tested by several on ports@, thanks!
35 lines
1.4 KiB
Plaintext
35 lines
1.4 KiB
Plaintext
$OpenBSD: patch-configure_in,v 1.18 2010/06/28 21:24:22 landry Exp $
|
|
--- configure.in.orig Fri Jun 11 22:41:30 2010
|
|
+++ configure.in Thu Jun 24 10:08:43 2010
|
|
@@ -1059,7 +1059,7 @@ MOZ_PNG_LIBS='$(call EXPAND_LIBNAME_PATH,mozpng,$(DEPT
|
|
|
|
MOZ_JS_LIBS='-L$(LIBXUL_DIST)/bin -lmozjs'
|
|
DYNAMIC_XPCOM_LIBS='-L$(LIBXUL_DIST)/bin -lxpcom -lxpcom_core'
|
|
-MOZ_FIX_LINK_PATHS='-Wl,-rpath-link,$(LIBXUL_DIST)/bin -Wl,-rpath-link,$(prefix)/lib'
|
|
+MOZ_FIX_LINK_PATHS='-Wl,-rpath-link,$(LIBXUL_DIST)/bin -Wl,-rpath-link,$(prefix)/lib -L$(LIBXUL_DIST)/bin'
|
|
XPCOM_FROZEN_LDOPTS='-L$(LIBXUL_DIST)/bin -lxpcom'
|
|
LIBXUL_LIBS='$(XPCOM_FROZEN_LDOPTS) -lxul'
|
|
XPCOM_GLUE_LDOPTS='$(LIBXUL_DIST)/lib/$(LIB_PREFIX)xpcomglue_s.$(LIB_SUFFIX) $(XPCOM_FROZEN_LDOPTS)'
|
|
@@ -2403,7 +2403,7 @@ case "$target" in
|
|
;;
|
|
|
|
*-openbsd*)
|
|
- DLL_SUFFIX=".so.1.0"
|
|
+ DLL_SUFFIX=".so.${SO_VERSION}"
|
|
DSO_CFLAGS=''
|
|
DSO_PIC_CFLAGS='-fPIC'
|
|
DSO_LDOPTS='-shared -fPIC'
|
|
@@ -4132,9 +4132,9 @@ AC_CACHE_CHECK(for __thread keyword for TLS variables,
|
|
ac_cv_thread_keyword=yes,
|
|
ac_cv_thread_keyword=no)])
|
|
LDFLAGS=$_SAVE_LDFLAGS
|
|
-if test "$ac_cv_thread_keyword" = yes; then
|
|
- AC_DEFINE(HAVE_THREAD_TLS_KEYWORD)
|
|
-fi
|
|
+dnl if test "$ac_cv_thread_keyword" = yes; then
|
|
+dnl AC_DEFINE(HAVE_THREAD_TLS_KEYWORD)
|
|
+dnl fi
|
|
|
|
dnl End of C++ language/feature checks
|
|
AC_LANG_C
|