aports/community/firefox/APKBUILD
2025-05-31 18:52:15 +02:00

743 lines
20 KiB
Text

# Contributor: Sören Tempel <soeren+alpine@soeren-tempel.net>
# Contributor: Rasmus Thomsen <oss@cogitri.dev>
# Maintainer: Patrycja Rosa <alpine@ptrcnull.me>
pkgname=firefox
pkgver=139.0
_releasedate=2025-05-27
pkgrel=1
pkgdesc="Firefox web browser"
url="https://www.firefox.com/"
# s390x blocked by lld
# armhf: https://bugzilla.mozilla.org/show_bug.cgi?id=1680495
arch="all !s390x !armhf"
license="GPL-3.0-only AND LGPL-2.1-only AND LGPL-3.0-only AND MPL-2.0"
# ffmpeg 6 -> 112
depends="
ffmpeg-libavcodec
mesa-egl
mesa-gl
pciutils-libs
"
_llvmver=20
makedepends="
alsa-lib-dev
automake
bsd-compat-headers
cargo
cbindgen
clang$_llvmver
clang$_llvmver-libclang
compiler-rt
dbus
dbus-dev
gettext
gettext-envsubst
gtk+3.0-dev
hunspell-dev
icu-dev
libevent-dev
libffi-dev
libjpeg-turbo-dev
libnotify-dev
libogg-dev
libtheora-dev
libtool
libvorbis-dev
libvpx-dev
libwebp-dev
libxcomposite-dev
libxt-dev
lld
llvm$_llvmver-dev
m4
mesa-dev
mesa-dri-gallium
mimalloc2-insecure
nasm
nodejs
nspr-dev
nss-dev
patchelf
pciutils
pipewire-dev
pulseaudio-dev
py3-zstandard
python3
scudo-malloc
sed
wasi-compiler-rt
wasi-sdk
wireless-tools-dev
xvfb-run
zip
"
subpackages="$pkgname-intl"
case "$CARCH" in
riscv64|x86|arm*) ;;
*) subpackages="$subpackages $pkgname-dbg" ;;
esac
source="$pkgname-$pkgver.tar.xz::https://ftp.mozilla.org/pub/firefox/releases/$pkgver/source/firefox-$pkgver.source.tar.xz
abseil-cpp.patch
bmo-1952657-no-execinfo.patch
bmo-1953266-sqlite-vec-uint.patch
fix-fortify-system-wrappers.patch
fix-rust-target.patch
fix-webrtc-glibcisms.patch
lfs64.patch
no-ccache-stats.patch
rust-lto-thin.patch
riscv64-no-lto.patch
sandbox-sched_setscheduler.patch
sqlite-ppc.patch
loong0001-Enable-WebRTC-for-loongarch64.patch
loong0003-Define-HWCAP_LOONGARCH_LSX_and_LASX.patch
loong0004-Fix-ycbcr-chromium_types-warning.patch
loong0005-Fix-libyuv-build-with-LSX-LASX.patch
loong-skia-lasx.patch
stab.h
mozconfig
firefox.desktop
distribution.ini
mozilla-location.keys
vendor-prefs.js
"
# tests are hard to run
options="!check"
_mozappdir=/usr/lib/firefox
# help our shared-object scanner to find the libs
ldpath="$_mozappdir"
sonameprefix="$pkgname:"
# secfixes:
# 119.0-r0:
# - CVE-2023-5721
# - CVE-2023-5722
# - CVE-2023-5723
# - CVE-2023-5724
# - CVE-2023-5725
# - CVE-2023-5726
# - CVE-2023-5727
# - CVE-2023-5728
# - CVE-2023-5729
# - CVE-2023-5730
# - CVE-2023-5731
# 103.0-r0:
# - CVE-2022-2505
# - CVE-2022-36314
# - CVE-2022-36315
# - CVE-2022-36316
# - CVE-2022-36317
# - CVE-2022-36318
# - CVE-2022-36319
# - CVE-2022-36320
# 102.0-r0:
# - CVE-2022-2200
# - CVE-2022-34468
# - CVE-2022-34469
# - CVE-2022-34470
# - CVE-2022-34471
# - CVE-2022-34472
# - CVE-2022-34473
# - CVE-2022-34474
# - CVE-2022-34475
# - CVE-2022-34476
# - CVE-2022-34477
# - CVE-2022-34478
# - CVE-2022-34479
# - CVE-2022-34480
# - CVE-2022-34481
# - CVE-2022-34482
# - CVE-2022-34483
# - CVE-2022-34484
# - CVE-2022-34485
# 101.0-r0:
# - CVE-2022-1919
# - CVE-2022-31736
# - CVE-2022-31737
# - CVE-2022-31738
# - CVE-2022-31739
# - CVE-2022-31740
# - CVE-2022-31741
# - CVE-2022-31742
# - CVE-2022-31743
# - CVE-2022-31744
# - CVE-2022-31745
# - CVE-2022-31747
# - CVE-2022-31748
# 100.0.2-r0:
# - CVE-2022-1529
# - CVE-2022-1802
# 100.0-r0:
# - CVE-2022-29909
# - CVE-2022-29910
# - CVE-2022-29911
# - CVE-2022-29912
# - CVE-2022-29914
# - CVE-2022-29915
# - CVE-2022-29916
# - CVE-2022-29917
# - CVE-2022-29918
# 99.0-r0:
# - CVE-2022-1097
# - CVE-2022-24713
# - CVE-2022-28281
# - CVE-2022-28282
# - CVE-2022-28283
# - CVE-2022-28284
# - CVE-2022-28285
# - CVE-2022-28286
# - CVE-2022-28287
# - CVE-2022-28288
# - CVE-2022-28289
# 98.0-r0:
# - CVE-2022-0843
# - CVE-2022-26381
# - CVE-2022-26382
# - CVE-2022-26383
# - CVE-2022-26384
# - CVE-2022-26385
# - CVE-2022-26387
# 97.0.2-r0:
# - CVE-2022-26485
# - CVE-2022-26486
# 97.0-r0:
# - CVE-2021-4140
# - CVE-2022-0511
# - CVE-2022-22736
# - CVE-2022-22737
# - CVE-2022-22738
# - CVE-2022-22739
# - CVE-2022-22740
# - CVE-2022-22741
# - CVE-2022-22742
# - CVE-2022-22743
# - CVE-2022-22744
# - CVE-2022-22745
# - CVE-2022-22746
# - CVE-2022-22747
# - CVE-2022-22748
# - CVE-2022-22749
# - CVE-2022-22750
# - CVE-2022-22751
# - CVE-2022-22752
# - CVE-2022-22753
# - CVE-2022-22754
# - CVE-2022-22755
# - CVE-2022-22756
# - CVE-2022-22757
# - CVE-2022-22758
# - CVE-2022-22759
# - CVE-2022-22760
# - CVE-2022-22761
# - CVE-2022-22762
# - CVE-2022-22764
# 95.0-r0:
# - CVE-2021-43536
# - CVE-2021-43537
# - CVE-2021-43538
# - CVE-2021-43539
# - CVE-2021-43540
# - CVE-2021-43541
# - CVE-2021-43542
# - CVE-2021-43543
# - CVE-2021-43544
# - CVE-2021-43545
# - CVE-2021-43546
# 94.0-r0:
# - CVE-2021-38503
# - CVE-2021-38504
# - CVE-2021-38505
# - CVE-2021-38506
# - CVE-2021-38507
# - CVE-2021-38508
# - CVE-2021-38509
# - CVE-2021-38510
# 93.0-r0:
# - CVE-2021-32810
# - CVE-2021-38496
# - CVE-2021-38497
# - CVE-2021-38498
# - CVE-2021-38499
# - CVE-2021-38500
# - CVE-2021-38501
# 92.0.1-r0:
# - CVE-2021-29980
# - CVE-2021-29981
# - CVE-2021-29982
# - CVE-2021-29983
# - CVE-2021-29984
# - CVE-2021-29985
# - CVE-2021-29986
# - CVE-2021-29987
# - CVE-2021-29988
# - CVE-2021-29989
# - CVE-2021-29990
# - CVE-2021-29991
# - CVE-2021-29993
# - CVE-2021-38491
# - CVE-2021-38492
# - CVE-2021-38493
# - CVE-2021-38494
# 90.0-r0:
# - CVE-2021-29970
# - CVE-2021-29972
# - CVE-2021-29974
# - CVE-2021-29975
# - CVE-2021-29976
# - CVE-2021-29977
# - CVE-2021-30547
# 89.0-r0:
# - CVE-2021-29959
# - CVE-2021-29960
# - CVE-2021-29961
# - CVE-2021-29962
# - CVE-2021-29963
# - CVE-2021-29965
# - CVE-2021-29966
# - CVE-2021-29967
# 88.0.1-r0:
# - CVE-2021-29952
# 88.0-r0:
# - CVE-2021-23994
# - CVE-2021-23995
# - CVE-2021-23996
# - CVE-2021-23997
# - CVE-2021-23998
# - CVE-2021-23999
# - CVE-2021-24000
# - CVE-2021-24001
# - CVE-2021-24002
# - CVE-2021-29944
# - CVE-2021-29945
# - CVE-2021-29946
# - CVE-2021-29947
# 87.0-r0:
# - CVE-2021-23968
# - CVE-2021-23969
# - CVE-2021-23970
# - CVE-2021-23971
# - CVE-2021-23972
# - CVE-2021-23973
# - CVE-2021-23974
# - CVE-2021-23975
# - CVE-2021-23976
# - CVE-2021-23977
# - CVE-2021-23978
# - CVE-2021-23979
# - CVE-2021-23981
# - CVE-2021-23982
# - CVE-2021-23983
# - CVE-2021-23984
# - CVE-2021-23985
# - CVE-2021-23986
# - CVE-2021-23987
# - CVE-2021-23988
# 85.0-r0:
# - CVE-2021-23954
# - CVE-2021-23955
# - CVE-2021-23956
# - CVE-2021-23957
# - CVE-2021-23958
# - CVE-2021-23959
# - CVE-2021-23960
# - CVE-2021-23961
# - CVE-2021-23962
# - CVE-2021-23963
# - CVE-2021-23964
# - CVE-2021-23965
# 84.0.2-r0:
# - CVE-2020-16044
# 84.0.1-r0:
# - CVE-2020-16042
# - CVE-2020-26971
# - CVE-2020-26972
# - CVE-2020-26973
# - CVE-2020-26974
# - CVE-2020-26975
# - CVE-2020-26976
# - CVE-2020-26977
# - CVE-2020-26978
# - CVE-2020-26979
# - CVE-2020-35111
# - CVE-2020-35112
# - CVE-2020-35113
# - CVE-2020-35114
# 83.0-r0:
# - CVE-2020-15999
# - CVE-2020-16012
# - CVE-2020-26952
# - CVE-2020-26953
# - CVE-2020-26954
# - CVE-2020-26955
# - CVE-2020-26956
# - CVE-2020-26957
# - CVE-2020-26958
# - CVE-2020-26959
# - CVE-2020-26960
# - CVE-2020-26961
# - CVE-2020-26962
# - CVE-2020-26963
# - CVE-2020-26964
# - CVE-2020-26965
# - CVE-2020-26966
# - CVE-2020-26967
# - CVE-2020-26968
# - CVE-2020-26969
# 82.0.3-r0:
# - CVE-2020-26950
# 82.0-r0:
# - CVE-2020-15254
# - CVE-2020-15680
# - CVE-2020-15681
# - CVE-2020-15682
# - CVE-2020-15683
# - CVE-2020-15684
# - CVE-2020-15969
# 81.0-r0:
# - CVE-2020-15673
# - CVE-2020-15674
# - CVE-2020-15675
# - CVE-2020-15676
# - CVE-2020-15677
# - CVE-2020-15678
# 80.0-r0:
# - CVE-2020-6829
# - CVE-2020-12400
# - CVE-2020-12401
# - CVE-2020-15663
# - CVE-2020-15664
# - CVE-2020-15665
# - CVE-2020-15666
# - CVE-2020-15667
# - CVE-2020-15668
# - CVE-2020-15670
# 79.0-r0:
# - CVE-2020-6463
# - CVE-2020-6514
# - CVE-2020-15652
# - CVE-2020-15653
# - CVE-2020-15654
# - CVE-2020-15655
# - CVE-2020-15656
# - CVE-2020-15657
# - CVE-2020-15658
# - CVE-2020-15659
# 78.0-r0:
# - CVE-2020-12415
# - CVE-2020-12416
# - CVE-2020-12417
# - CVE-2020-12418
# - CVE-2020-12419
# - CVE-2020-12420
# - CVE-2020-12402
# - CVE-2020-12421
# - CVE-2020-12422
# - CVE-2020-12423
# - CVE-2020-12424
# - CVE-2020-12425
# - CVE-2020-12426
# 77.0-r0:
# - CVE-2020-12399
# - CVE-2020-12405
# - CVE-2020-12406
# - CVE-2020-12407
# - CVE-2020-12408
# - CVE-2020-12409
# - CVE-2020-12411
# 76.0-r0:
# - CVE-2020-6831
# - CVE-2020-12387
# - CVE-2020-12388
# - CVE-2020-12389
# - CVE-2020-12390
# - CVE-2020-12391
# - CVE-2020-12392
# - CVE-2020-12393
# - CVE-2020-12394
# - CVE-2020-12395
# - CVE-2020-12396
# 75.0-r0:
# - CVE-2020-6821
# - CVE-2020-6822
# - CVE-2020-6823
# - CVE-2020-6824
# - CVE-2020-6825
# - CVE-2020-6826
# 74.0.1-r0:
# - CVE-2020-6819
# - CVE-2020-6820
# 74.0-r0:
# - CVE-2020-6805
# - CVE-2020-6806
# - CVE-2020-6807
# - CVE-2020-6808
# - CVE-2020-6809
# - CVE-2020-6810
# - CVE-2020-6811
# - CVE-2019-20503
# - CVE-2020-6812
# - CVE-2020-6813
# - CVE-2020-6814
# - CVE-2020-6815
# 71.0.1-r0:
# - CVE-2019-17016
# - CVE-2019-17017
# - CVE-2019-17020
# - CVE-2019-17022
# - CVE-2019-17023
# - CVE-2019-17024
# - CVE-2019-17025
# - CVE-2019-17026
# 70.0-r0:
# - CVE-2018-6156
# - CVE-2019-15903
# - CVE-2019-11757
# - CVE-2019-11759
# - CVE-2019-11760
# - CVE-2019-11761
# - CVE-2019-11762
# - CVE-2019-11763
# - CVE-2019-11764
# - CVE-2019-11765
# - CVE-2019-17000
# - CVE-2019-17001
# - CVE-2019-17002
# 68.0.2-r0:
# - CVE-2019-11733
# we need this because cargo verifies checksums of all files in vendor
# crates when it builds and gives us no way to override or update the
# file sanely... so just clear out the file list
_clear_vendor_checksums() {
sed -i 's/\("files":{\)[^}]*/\1/' third_party/rust/$1/.cargo-checksum.json
}
prepare() {
default_prepare
cp "$srcdir"/stab.h toolkit/crashreporter/google-breakpad/src/
export CFLAGS="${CFLAGS/-fstack-clash-protection/} -g0 -O2"
export CXXFLAGS="${CXXFLAGS/-fstack-clash-protection/} -g0 -O2 -Wno-deprecated-builtins -Wno-deprecated-declarations"
_clear_vendor_checksums audio_thread_priority
_clear_vendor_checksums libc
base64 -d "$srcdir"/mozilla-location.keys > "$builddir"/mozilla-api-key
}
build() {
export MOZ_BUILD_DATE="$(date ${SOURCE_DATE_EPOCH:+ -d@${SOURCE_DATE_EPOCH}} "+%Y%m%d%H%M%S")"
# for lto
ulimit -n 4096
# can't be set here and fail
unset RUSTFLAGS
local thinlto_jobs=${JOBS:-1}
local link_threads=${JOBS:-1}
case "$CARCH" in
# on this platform, lld seems to not utilise >1 threads for thinlto for some reason.
# at the same time, having more than 8 also crashes lld for firefox buildsystems (why?).
aarch64)
if [ $thinlto_jobs -gt 8 ]; then
thinlto_jobs=8
fi
;;
esac
case "$CARCH" in
arm*|x86)
link_threads=1
;;
esac
export LDFLAGS="$LDFLAGS -Wl,--thinlto-jobs=$thinlto_jobs -Wl,--threads=$link_threads"
export SHELL=/bin/sh
export BUILD_OFFICIAL=1
export MOZILLA_OFFICIAL=1
export USE_SHORT_LIBNAME=1
export MACH_BUILD_PYTHON_NATIVE_PACKAGE_SOURCE=system
export MOZ_APP_REMOTINGNAME=firefox
export MOZBUILD_STATE_PATH="$srcdir"/mozbuild
# disable desktop notifications
export MOZ_NOSPAM=1
# Find our triplet JSON
export RUST_TARGET="$CTARGET"
# has to be same version or older than lld
export CC="clang-$_llvmver"
export CXX="clang++-$_llvmver"
# set rpath so linker finds the libs
export LDFLAGS="$LDFLAGS -Wl,-rpath,$_mozappdir"
# let firefox do this itself.
unset CARGO_PROFILE_RELEASE_OPT_LEVEL
unset CARGO_PROFILE_RELEASE_LTO
export CBUILD CHOST builddir
envsubst < "$srcdir"/mozconfig > base-mozconfig
case "$CARCH" in
# mimalloc clashes with scudo in a weird way here
# we can try to minimize memory usage instead by reducing parallels
x86)
export MOZ_PARALLEL_BUILD=4
;;
# default allocator returns oom ( and, in turn, std::bad_alloc in clang )
# at even ~70% of host memory usage
*)
export LD_PRELOAD=/usr/lib/libmimalloc-insecure.so.2
;;
esac
case "$CARCH" in
aarch64|x86_64|ppc64le)
msg "building instrumented firefox"
cat > profile-mozconfig base-mozconfig - <<-EOF
ac_add_options --enable-profile-generate=cross
EOF
export MOZCONFIG=profile-mozconfig
./mach build
./mach package
msg "profiling firefox"
LLVM_PROFDATA=llvm-profdata \
JARLOG_FILE="$PWD"/jarlog \
GDK_BACKEND=x11 \
LD_LIBRARY_PATH="$PWD"/obj/dist/firefox \
XDG_RUNTIME_DIR="$(mktemp -d "$builddir/pgo-runtime-XXXXXX")" \
MOZ_ENABLE_WAYLAND=0 \
xvfb-run -a -s "-screen 0 1920x1080x24 -nolisten local" \
dbus-run-session -- \
./mach python build/pgo/profileserver.py
test -s merged.profdata
test -s jarlog
./mach clobber
msg "building optimised firefox"
cat > optimised-mozconfig base-mozconfig - <<-EOF
ac_add_options --enable-lto=cross
ac_add_options --enable-profile-use=cross
ac_add_options --with-pgo-profile-path="$PWD"/merged.profdata
ac_add_options --with-pgo-jarlog="$PWD"/jarlog
EOF
export MOZCONFIG=optimised-mozconfig
./mach build
;;
armv7|x86|riscv64|loongarch64)
# others: no pgo here as it uses too much memory/broken on riscv
msg "building regular firefox"
cat > regular-mozconfig base-mozconfig - <<-EOF
ac_add_options --disable-profiling
EOF
export MOZCONFIG=regular-mozconfig
./mach build
;;
*)
msg "implement build for $CARCH"
exit 1
esac
}
package() {
DESTDIR="$pkgdir" ./mach install
local _png
for _png in ./browser/branding/official/default*.png; do
local i=${_png%.png}
i=${i##*/default}
install -d "$pkgdir"/usr/share/icons/hicolor/"$i"x"$i"/apps/
ln -s "$_mozappdir"/browser/chrome/icons/default/default"$i".png \
"$pkgdir"/usr/share/icons/hicolor/"$i"x"$i"/apps/firefox.png
done
case "$CARCH" in
x86|arm*) ;;
*) patchelf --add-needed libscudo.so "$pkgdir"/usr/lib/firefox/firefox ;;
esac
install -Dm644 browser/branding/official/content/about-logo.png \
"$pkgdir"/usr/share/icons/hicolor/192x192/apps/$pkgname.png
install -Dm644 browser/branding/official/default256.png \
"$pkgdir"/"$_mozappdir"/browser/chrome/icons/default/default256.png
install -Dm644 browser/branding/official/content/about-logo@2x.png \
"$pkgdir"/usr/share/icons/hicolor/384x384/apps/$pkgname.png
install -Dm644 browser/branding/official/content/about-logo.svg \
"$pkgdir"/usr/share/icons/hicolor/scalable/apps/$pkgname.svg
install -Dm644 "$srcdir"/firefox.desktop \
"$pkgdir"/usr/share/applications/firefox.desktop
install -Dm644 "$srcdir"/distribution.ini \
"$pkgdir"/$_mozappdir/distribution/distribution.ini
# install our vendor prefs
install -Dm644 "$srcdir"/vendor-prefs.js \
"$pkgdir"/$_mozappdir/browser/defaults/preferences/vendor.js
# Generate appdata file
mkdir -p "$pkgdir"/usr/share/metainfo/
export VERSION="$pkgver"
export DATE="$_releasedate"
envsubst < "$builddir"/browser/installer/linux/app/flatpak/files/share/appdata/org.mozilla.firefox.appdata.xml.in > "$pkgdir"/usr/share/metainfo/org.mozilla.firefox.appdata.xml
# Replace duplicate binary with wrapper
# https://bugzilla.mozilla.org/show_bug.cgi?id=658850
install -Dm755 /dev/stdin "$pkgdir"/usr/bin/firefox <<- EOF
#!/bin/sh
exec $_mozappdir/firefox "\$@"
EOF
rm "$pkgdir"/$_mozappdir/firefox-bin
ln -sfv /usr/bin/firefox "$pkgdir"/$_mozappdir/firefox-bin
# Add paxrelabel configuration to grant JIT access on systems with
# a PaX implementation.
mkdir -p "$pkgdir"/usr/share/paxrelabel.d
echo "PEmRs /usr/lib/firefox/firefox" > "$pkgdir"/usr/share/paxrelabel.d/"$pkgname"
}
intl() {
pkgdesc="$pkgname - International ICU data"
depends="icu-data-full"
install_if="$pkgname=$pkgver-r$pkgrel icu"
mkdir -p "$subpkgdir"
}
sha512sums="
84a2b47f2ff71aac226a774ab0ac9ab8d9a16f5620a06f7abb6648732209d022aef35a9d4873e91ebd67a4fc494fc238524e25c38fad8046db26afda06e6f970 firefox-139.0.tar.xz
616169325dc7715d3ff558c1846394d992f1a0a9427af5339e84abf3d9e7d85a5f9f6bae218ee3416ef39769a56150ac35881435ac09b976876fd556fddeac38 abseil-cpp.patch
32c566a1529d36b4816cef80bb56f0723d0ec2e407e5e4a61cd278d40dafa3a3032d5a77497f191989f4954fa3ee539845dd170a596e0b22c6ef5b337405a72e bmo-1952657-no-execinfo.patch
47e216a0d7e279750c839e636bfb5f1e1a92c9eff65afc388c98a5a5a9d2136c5b1ef2f0f9e73ecff7142c0659b6b9c2f19def47d023a02dac01ac6f1b55595e bmo-1953266-sqlite-vec-uint.patch
19eea840aa9c1c21e7bd1f832ec078989fe6f08fca40baa271be7e74f1cffeb5ab8d3218a93e664b8d90a41506dede524e2a5174cd47580866109bc6711ea969 fix-fortify-system-wrappers.patch
cd68b89e29e5f6379fbd5679db27b9a5ef70ea65e51c0d0a8137e1f1fd210e35a8cfb047798e9549bc7275606d7ec5c8d8af1335d29da4699db7acd8bc7ff556 fix-rust-target.patch
305c874fdea3096e9c4c6aa6520ac64bb1c347c4b59db8360096646593fe684c3b5377874d91cecd33d56d1410b4714fbdea2b514923723ecbeff79d51265d9b fix-webrtc-glibcisms.patch
e75daab5573ec6e28d3940a9bb98304d572dfb26ce7c1709e99fdd75dfa58abce170c96de683f8dc2224ea2e118aa7d78affbd54f99c4e328a4641685d64bd7d lfs64.patch
c0437a6753f3f350968fa12d250efdfe1bea77baf0e4c06b072b5cc9e78c774dbf4506bc536337030d349fb3ba4460097b75b0c7c5b8fb2d39d8b0a392948936 no-ccache-stats.patch
1c6918dd6655d3a1251bfd4af2e1c561cbb00d540a883b4c1ebf7f5de530d754d9ac07b4b5f56cdab6c511d25c8910ec94043f5733e97501a67abffe1bafaeb1 rust-lto-thin.patch
b12dbff6513ac8c231d91c257a9accecc034d9ea9c31d99ca0454334ccf80fe7b50d6a356182dc46a9f25064366ea9a177f463cb2544b1cf5368ee6bd71bc095 riscv64-no-lto.patch
f8c3555ef6207933cbffbf4fc101a9b4c0d2990c0063162f0f0bde70ef0b46f86bfac42e7110695183424a87948de593f3927b2d8509ede3e4fc7bd8a1fad1ce sandbox-sched_setscheduler.patch
67bc0be3da973e6859256bf9be4df7100837430e6076fc0bd623f504c35e02e6c191e9c5a3a1d202e5ad4d89f874f254a09e164e39c7bfd97bbc8d4c8d0632a5 sqlite-ppc.patch
10190908796ea681cb9c7726e5f000d010dc438560f1c9574ad52f91b984c92634291453d4f7cdb3a5b5e54c1968513bf78d4dc44f5befa39d58065d0e9c3326 loong0001-Enable-WebRTC-for-loongarch64.patch
bcc6987568082e5471962fed98110c13f9a81de7bba11cd961c2ac6c1240e677dc141d6834bf5755d2d85fc8251e522920dd3d9afae20ed9d9896b632ee9336f loong0003-Define-HWCAP_LOONGARCH_LSX_and_LASX.patch
f95b3a8338b34c98ae028278fcec3a1ae48d8de9fa9eed54544151ae994b57b8d0ff0e6363632257d3cbe9452bcd93ade5c139cf728d0a149a038a179a0b4016 loong0004-Fix-ycbcr-chromium_types-warning.patch
530a695c6f456db6988d850571b9b640320444fe46aba97371b5553ddad2103fed5e1064b790924dd90af47861807de4386958cabe3bcaa48700f330ce5bd6df loong0005-Fix-libyuv-build-with-LSX-LASX.patch
db85b37c10a0c7c3c68b28e68a46af96c7200354270d551fe17da9f615f19a4606fd431f873354ec33b308248406d5ae83543ccc177c13ddcde5cb6faa766d2d loong-skia-lasx.patch
0b3f1e4b9fdc868e4738b5c81fd6c6128ce8885b260affcb9a65ff9d164d7232626ce1291aaea70132b3e3124f5e13fef4d39326b8e7173e362a823722a85127 stab.h
fb874e7de22118f42777d562ae3bb80707666e12711688bc250de9cc47b0387696a88b06ab827fa23e5d913e0ed2cc7f8f24476e647cd49b8a2df16911d6b464 mozconfig
4560083a0642ba2764539e56cdd45a8d5c1a7a5855f8b09b7f5f7a3c107520a2b6aac84df62a24394f18003c0429ad3f177342c1667e40820870d7d950975bc1 firefox.desktop
9869ef092609af4caed6aa27f3de6ac49b91ef993ccbfd8a2080465def442d3b02745fbe3c71d362f07c3075d46f388a023c0ad8ebb5f6ffd37e601d997b74f7 distribution.ini
382510375b1a2fa79be0ab79e3391a021ae2c022429ffbaa7e7a69166f99bb56d01e59a1b10688592a29238f21c9d6977672bd77f9fae439b66bdfe0c55ddb15 mozilla-location.keys
5ac990fce470485b244831a9121c9349cbd23093a372547aadc3c16f071537ede6f001e0f4c7769b01923e9b94262e99667b6187052df4db167ef36441743f65 vendor-prefs.js
"