forked from pool/MozillaFirefox
a9628fa6ae
* https://www.mozilla.org/en-US/firefox/74.0/releasenotes/ MFSA 2020-08 (bsc#1166238) * CVE-2020-6805 (bmo#1610880) Use-after-free when removing data about origins * CVE-2020-6806 (bmo#1612308) BodyStream::OnInputStreamReady was missing protections against state confusion * CVE-2020-6807 (bmo#1614971) Use-after-free in cubeb during stream destruction * CVE-2020-6808 (bmo#1247968) URL Spoofing via javascript: URL * CVE-2020-6809 (bmo#1420296) Web Extensions with the all-urls permission could access local files * CVE-2020-6810 (bmo#1432856) Focusing a popup while in fullscreen could have obscured the fullscreen notification * CVE-2020-6811 (bmo#1607742) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2019-20503 (bmo#1613765) Out of bounds reads in sctp_load_addresses_from_init * CVE-2020-6812 (bmo#1616661) The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission * CVE-2020-6813 (bmo#1605814) @import statements in CSS could bypass the Content Security Policy nonce feature * CVE-2020-6814 (bmo#1592078,bmo#1604847,bmo#1608256,bmo#1612636, OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=809
57 lines
2.0 KiB
Diff
57 lines
2.0 KiB
Diff
# HG changeset patch
|
|
# User msirringhaus@suse.de
|
|
# Date 1558452408 -7200
|
|
# Tue May 21 17:26:48 2019 +0200
|
|
# Node ID 602e92722e765a3c238d3b96b26c0c8063b5eeb4
|
|
# Parent cb0089687ab899846b8229c3741261d50101340e
|
|
[mq]: mozilla-s390-context.patch
|
|
|
|
diff --git a/js/src/wasm/WasmSignalHandlers.cpp b/js/src/wasm/WasmSignalHandlers.cpp
|
|
--- a/js/src/wasm/WasmSignalHandlers.cpp
|
|
+++ b/js/src/wasm/WasmSignalHandlers.cpp
|
|
@@ -150,16 +150,20 @@ using mozilla::DebugOnly;
|
|
# define FP_sig(p) ((p)->uc_mcontext.mc_fp)
|
|
# define SP_sig(p) ((p)->uc_mcontext.mc_i7)
|
|
# endif
|
|
# if defined(__linux__) && (defined(__ppc64__) || defined(__PPC64__) || \
|
|
defined(__ppc64le__) || defined(__PPC64LE__))
|
|
# define R01_sig(p) ((p)->uc_mcontext.gp_regs[1])
|
|
# define R32_sig(p) ((p)->uc_mcontext.gp_regs[32])
|
|
# endif
|
|
+# if defined(__linux__) && defined(__s390x__)
|
|
+# define GR_sig(p,x) ((p)->uc_mcontext.gregs[x])
|
|
+# define PSWa_sig(p) ((p)->uc_mcontext.psw.addr)
|
|
+# endif
|
|
#elif defined(__NetBSD__)
|
|
# define EIP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EIP])
|
|
# define EBP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EBP])
|
|
# define ESP_sig(p) ((p)->uc_mcontext.__gregs[_REG_ESP])
|
|
# define RIP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RIP])
|
|
# define RSP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RSP])
|
|
# define RBP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RBP])
|
|
# define R11_sig(p) ((p)->uc_mcontext.__gregs[_REG_R11])
|
|
@@ -381,18 +385,23 @@ struct macos_arm_context {
|
|
# define FP_sig(p) RFP_sig(p)
|
|
# define SP_sig(p) RSP_sig(p)
|
|
# define LR_sig(p) R31_sig(p)
|
|
#elif defined(__ppc64__) || defined(__PPC64__) || defined(__ppc64le__) || \
|
|
defined(__PPC64LE__)
|
|
# define PC_sig(p) R32_sig(p)
|
|
# define SP_sig(p) R01_sig(p)
|
|
# define FP_sig(p) R01_sig(p)
|
|
+#elif defined(__s390x__)
|
|
+# define PC_sig(p) PSWa_sig(p)
|
|
+# define SP_sig(p) GR_sig(p, 15)
|
|
+# define FP_sig(p) GR_sig(p, 11)
|
|
#endif
|
|
|
|
+
|
|
static void SetContextPC(CONTEXT* context, uint8_t* pc) {
|
|
#ifdef PC_sig
|
|
*reinterpret_cast<uint8_t**>(&PC_sig(context)) = pc;
|
|
#else
|
|
MOZ_CRASH();
|
|
#endif
|
|
}
|
|
|