forked from pool/MozillaFirefox
a9628fa6ae
* https://www.mozilla.org/en-US/firefox/74.0/releasenotes/ MFSA 2020-08 (bsc#1166238) * CVE-2020-6805 (bmo#1610880) Use-after-free when removing data about origins * CVE-2020-6806 (bmo#1612308) BodyStream::OnInputStreamReady was missing protections against state confusion * CVE-2020-6807 (bmo#1614971) Use-after-free in cubeb during stream destruction * CVE-2020-6808 (bmo#1247968) URL Spoofing via javascript: URL * CVE-2020-6809 (bmo#1420296) Web Extensions with the all-urls permission could access local files * CVE-2020-6810 (bmo#1432856) Focusing a popup while in fullscreen could have obscured the fullscreen notification * CVE-2020-6811 (bmo#1607742) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2019-20503 (bmo#1613765) Out of bounds reads in sctp_load_addresses_from_init * CVE-2020-6812 (bmo#1616661) The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission * CVE-2020-6813 (bmo#1605814) @import statements in CSS could bypass the Content Security Policy nonce feature * CVE-2020-6814 (bmo#1592078,bmo#1604847,bmo#1608256,bmo#1612636, OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=809
55 lines
1.8 KiB
Diff
55 lines
1.8 KiB
Diff
# HG changeset patch
|
|
# Parent e42a036a5533ea6a60ebc22fd2a150c384d42fda
|
|
This fixes a broken build for gcc < 9 on ppc64le.
|
|
This patch can be removed for newer gcc-versions.
|
|
|
|
diff --git a/js/xpconnect/src/XPCWrappedNative.cpp b/js/xpconnect/src/XPCWrappedNative.cpp
|
|
--- a/js/xpconnect/src/XPCWrappedNative.cpp
|
|
+++ b/js/xpconnect/src/XPCWrappedNative.cpp
|
|
@@ -1080,17 +1080,21 @@ class MOZ_STACK_CLASS CallMethodHelper f
|
|
uint32_t* result);
|
|
|
|
MOZ_ALWAYS_INLINE bool GetInterfaceTypeFromParam(const nsXPTType& type,
|
|
nsID* result) const;
|
|
|
|
MOZ_ALWAYS_INLINE bool GetOutParamSource(uint8_t paramIndex,
|
|
MutableHandleValue srcp) const;
|
|
|
|
- MOZ_ALWAYS_INLINE bool GatherAndConvertResults();
|
|
+#if !(__GNUC__ && __linux__ && __PPC64__ && _LITTLE_ENDIAN)
|
|
+// Work around a compiler bug on ppc64le (bug 1512162).
|
|
+ MOZ_ALWAYS_INLINE
|
|
+#endif
|
|
+ bool GatherAndConvertResults();
|
|
|
|
MOZ_ALWAYS_INLINE bool QueryInterfaceFastPath();
|
|
|
|
nsXPTCVariant* GetDispatchParam(uint8_t paramIndex) {
|
|
if (paramIndex >= mJSContextIndex) {
|
|
paramIndex += 1;
|
|
}
|
|
if (paramIndex >= mOptArgcIndex) {
|
|
@@ -1127,17 +1131,21 @@ class MOZ_STACK_CLASS CallMethodHelper f
|
|
|
|
{
|
|
// Success checked later.
|
|
mIFaceInfo->GetMethodInfo(mVTableIndex, &mMethodInfo);
|
|
}
|
|
|
|
~CallMethodHelper();
|
|
|
|
- MOZ_ALWAYS_INLINE bool Call();
|
|
+#if !(__GNUC__ && __linux__ && __PPC64__ && _LITTLE_ENDIAN)
|
|
+// Work around a compiler bug on ppc64le (bug 1512162).
|
|
+ MOZ_ALWAYS_INLINE
|
|
+#endif
|
|
+ bool Call();
|
|
|
|
// Trace implementation so we can put our CallMethodHelper in a Rooted<T>.
|
|
void trace(JSTracer* aTrc);
|
|
};
|
|
|
|
// static
|
|
bool XPCWrappedNative::CallMethod(XPCCallContext& ccx,
|
|
CallMode mode /*= CALL_METHOD */) {
|