2018-10-29 15:09:04 +01:00
|
|
|
|
|
|
|
# HG changeset patch
|
|
|
|
# User Mike Hommey <mh+mozilla@glandium.org>
|
|
|
|
# Date 1526871862 -32400
|
|
|
|
# Node ID 94f21505ff13cd089f7129cd24927cf8b31a0f43
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
# Parent 0b7e1398ca2e15e27da93144ba9fb30db38367b1
|
2018-10-29 15:09:04 +01:00
|
|
|
Bug 1463035 - Remove MOZ_SIGNAL_TRAMPOLINE. r?darchons
|
|
|
|
|
|
|
|
For some reason, GNU as is not happy with the assembly generated after
|
|
|
|
bug 1238661 anymore on Debian armel.
|
|
|
|
|
|
|
|
OTOH, as mentioned in bug 1238661 comment 4, we actually don't need this
|
|
|
|
workaround anymore, so let's just kill it.
|
|
|
|
|
2019-09-09 08:28:12 +02:00
|
|
|
diff --git a/mozglue/baseprofiler/core/platform-linux-android.cpp b/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
|
|
--- a/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
|
|
+++ b/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
|
|
@@ -55,17 +55,16 @@
|
|
|
|
#ifdef __GLIBC__
|
|
|
|
# include <execinfo.h> // backtrace, backtrace_symbols
|
|
|
|
#endif // def __GLIBC__
|
|
|
|
#include <strings.h> // index
|
|
|
|
#include <errno.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
|
|
|
|
#include "prenv.h"
|
|
|
|
-#include "mozilla/LinuxSignal.h"
|
|
|
|
#include "mozilla/PodOperations.h"
|
|
|
|
#include "mozilla/DebugOnly.h"
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <list>
|
|
|
|
|
|
|
|
using namespace mozilla;
|
|
|
|
|
|
|
|
@@ -266,17 +265,17 @@ Sampler::Sampler(PSLockRef aLock)
|
|
|
|
|
|
|
|
// NOTE: We don't initialize LUL here, instead initializing it in
|
|
|
|
// SamplerThread's constructor. This is because with the
|
|
|
|
// profiler_suspend_and_sample_thread entry point, we want to be able to
|
|
|
|
// sample without waiting for LUL to be initialized.
|
|
|
|
|
|
|
|
// Request profiling signals.
|
|
|
|
struct sigaction sa;
|
|
|
|
- sa.sa_sigaction = MOZ_SIGNAL_TRAMPOLINE(SigprofHandler);
|
|
|
|
+ sa.sa_sigaction = SigprofHandler;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
sa.sa_flags = SA_RESTART | SA_SIGINFO;
|
|
|
|
if (sigaction(SIGPROF, &sa, &mOldSigprofHandler) != 0) {
|
|
|
|
MOZ_CRASH("Error installing SIGPROF handler in the profiler");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void Sampler::Disable(PSLockRef aLock) {
|
2018-10-29 15:09:04 +01:00
|
|
|
diff --git a/tools/profiler/core/platform-linux-android.cpp b/tools/profiler/core/platform-linux-android.cpp
|
|
|
|
--- a/tools/profiler/core/platform-linux-android.cpp
|
|
|
|
+++ b/tools/profiler/core/platform-linux-android.cpp
|
- Mozilla Firefox 76.0
* Lockwise improvements
* Improvements in Picture-in-Picture feature
* Support Audio Worklets
MFSA-2020-16 (bsc#1171186)
* CVE-2020-12387 (bmo#1545345)
Use-after-free during worker shutdown
* CVE-2020-12388 (bmo#1618911)
Sandbox escape with improperly guarded Access Tokens
* CVE-2020-12389 (bmo#1554110)
Sandbox escape with improperly separated process types
* CVE-2020-6831 (bmo#1632241)
Buffer overflow in SCTP chunk input validation
* CVE-2020-12390 (bmo#1141959)
Incorrect serialization of nsIPrincipal.origin for IPv6 addresses
* CVE-2020-12391 (bmo#1457100)
Content-Security-Policy bypass using object elements
* CVE-2020-12392 (bmo#1614468)
Arbitrary local file access with 'Copy as cURL'
* CVE-2020-12393 (bmo#1615471)
Devtools' 'Copy as cURL' feature did not fully escape
website-controlled data, potentially leading to command injection
* CVE-2020-12394 (bmo#1628288)
URL spoofing in location bar when unfocussed
* CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508)
Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
* CVE-2020-12396 (bmo#1339601, bmo#1611938, bmo#1620488,
bmo#1622291, bmo#1627644)
Memory safety bugs fixed in Firefox 76
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=825
2020-05-05 21:25:39 +02:00
|
|
|
@@ -258,17 +258,17 @@ Sampler::Sampler(PSLockRef aLock)
|
2018-10-29 15:09:04 +01:00
|
|
|
|
|
|
|
// NOTE: We don't initialize LUL here, instead initializing it in
|
|
|
|
// SamplerThread's constructor. This is because with the
|
|
|
|
// profiler_suspend_and_sample_thread entry point, we want to be able to
|
|
|
|
// sample without waiting for LUL to be initialized.
|
|
|
|
|
|
|
|
// Request profiling signals.
|
|
|
|
struct sigaction sa;
|
|
|
|
- sa.sa_sigaction = MOZ_SIGNAL_TRAMPOLINE(SigprofHandler);
|
|
|
|
+ sa.sa_sigaction = SigprofHandler;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
sa.sa_flags = SA_RESTART | SA_SIGINFO;
|
|
|
|
if (sigaction(SIGPROF, &sa, &mOldSigprofHandler) != 0) {
|
|
|
|
MOZ_CRASH("Error installing SIGPROF handler in the profiler");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-29 19:07:12 +01:00
|
|
|
void Sampler::Disable(PSLockRef aLock) {
|