4685228ce1
* more privacy protections from Enhanced Tracking Protection * Firefox Lockwise passwordmanager * Improvements to core engine components, for better browsing on more sites * Improved privacy and security indicators MFSA 2019-34 * CVE-2018-6156 (bmo#1480088) Heap buffer overflow in FEC processing in WebRTC * CVE-2019-15903 (bmo#1584907) Heap overflow in expat library in XML_GetCurrentLineNumber * CVE-2019-11757 (bmo#1577107) Use-after-free when creating index updates in IndexedDB * CVE-2019-11759 (bmo#1577953) Stack buffer overflow in HKDF output * CVE-2019-11760 (bmo#1577719) Stack buffer overflow in WebRTC networking * CVE-2019-11761 (bmo#1561502) Unintended access to a privileged JSONView object * CVE-2019-11762 (bmo#1582857) document.domain-based origin isolation has same-origin-property violation * CVE-2019-11763 (bmo#1584216) Incorrect HTML parsing results in XSS bypass technique * CVE-2019-11765 (bmo#1562582) Incorrect permissions could be granted to a website * CVE-2019-17000 (bmo#1441468) CSP bypass using object tag with data: URI * CVE-2019-17001 (bmo#1587976) CSP bypass using object tag when script-src 'none' is specified * CVE-2019-17002 (bmo#1561056) upgrade-insecure-requests was not being honored for links dragged and dropped OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=786
55 lines
2.3 KiB
Diff
55 lines
2.3 KiB
Diff
# HG changeset patch
|
|
# User msirringhaus@suse.de
|
|
# Date 1560754926 -7200
|
|
# Mon Jun 17 09:02:06 2019 +0200
|
|
# Node ID 428161c3b9599083e1b8710eda1760f1f707ab11
|
|
# Parent fa1cf8b9cb4efdf89fe19e543fb54272b726a353
|
|
#Description: reduce the rust debuginfo level on selected architectures where
|
|
# compiling with debuginfo=2 causes the OOM killer to interrupt the build on
|
|
# launchpad builders. Initially this was only on 32 bit architectures, but with
|
|
# firefox 63 it started happening frequently on arm64 and ppc64el too.
|
|
|
|
diff --git a/build/moz.configure/toolchain.configure b/build/moz.configure/toolchain.configure
|
|
--- a/build/moz.configure/toolchain.configure
|
|
+++ b/build/moz.configure/toolchain.configure
|
|
@@ -1861,18 +1861,18 @@ imply_option('RUSTC_OPT_LEVEL', '2', whe
|
|
@depends('RUSTC_OPT_LEVEL', moz_optimize)
|
|
def rustc_opt_level(opt_level_option, moz_optimize):
|
|
if opt_level_option:
|
|
return opt_level_option[0]
|
|
else:
|
|
return '1' if moz_optimize.optimize else '0'
|
|
|
|
|
|
-@depends(rustc_opt_level, debug_rust, '--enable-debug-symbols', '--enable-frame-pointers')
|
|
-def rust_compile_flags(opt_level, debug_rust, debug_symbols, frame_pointers):
|
|
+@depends(rustc_opt_level, debug_rust, '--enable-debug-symbols', '--enable-frame-pointers', host)
|
|
+def rust_compile_flags(opt_level, debug_rust, debug_symbols, frame_pointers, host):
|
|
# Cargo currently supports only two interesting profiles for building:
|
|
# development and release. Those map (roughly) to --enable-debug and
|
|
# --disable-debug in Gecko, respectively.
|
|
#
|
|
# But we'd also like to support an additional axis of control for
|
|
# optimization level. Since Cargo only supports 2 profiles, we're in
|
|
# a bit of a bind.
|
|
#
|
|
@@ -1885,16 +1885,18 @@ def rust_compile_flags(opt_level, debug_
|
|
|
|
# opt-level=0 implies -C debug-assertions, which may not be desired
|
|
# unless Rust debugging is enabled.
|
|
if opt_level == '0' and not debug_rust:
|
|
debug_assertions = False
|
|
|
|
if debug_symbols:
|
|
debug_info = '2'
|
|
+ if host.bitness == 32 or host.cpu == 'aarch64' or host.cpu == 'ppc64':
|
|
+ debug_info = '1'
|
|
|
|
opts = []
|
|
|
|
if opt_level is not None:
|
|
opts.append('opt-level=%s' % opt_level)
|
|
if debug_assertions is not None:
|
|
opts.append('debug-assertions=%s' %
|
|
('yes' if debug_assertions else 'no'))
|