forked from pool/MozillaFirefox
c9ea1238e9
MFSA 2022-47 (bsc#1205270) * CVE-2022-45403 (bmo#1762078) Service Workers might have learned size of cross-origin media files * CVE-2022-45404 (bmo#1790815) Fullscreen notification bypass * CVE-2022-45405 (bmo#1791314) Use-after-free in InputStream implementation * CVE-2022-45406 (bmo#1791975) Use-after-free of a JavaScript Realm * CVE-2022-45407 (bmo#1793314) Loading fonts on workers was not thread-safe * CVE-2022-45408 (bmo#1793829) Fullscreen notification bypass via windowName * CVE-2022-45409 (bmo#1796901) Use-after-free in Garbage Collection * CVE-2022-45410 (bmo#1658869) ServiceWorker-intercepted requests bypassed SameSite cookie policy * CVE-2022-45411 (bmo#1790311) Cross-Site Tracing was possible via non-standard override headers * CVE-2022-45412 (bmo#1791029) Symlinks may resolve to partially uninitialized buffers * CVE-2022-45413 (bmo#1791201) SameSite=Strict cookies could have been sent cross-site via intent URLs * CVE-2022-40674 (bmo#1791598) Use-after-free vulnerability in expat * CVE-2022-45415 (bmo#1793551) Downloaded file may have been saved with malicious extension * CVE-2022-45416 (bmo#1793676) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=1019
54 lines
2.0 KiB
Diff
54 lines
2.0 KiB
Diff
# HG changeset patch
|
|
# User msirringhaus@suse.de
|
|
# Date 1558452408 -7200
|
|
# Tue May 21 17:26:48 2019 +0200
|
|
# Node ID 602e92722e765a3c238d3b96b26c0c8063b5eeb4
|
|
# Parent 6d6ebdace8a9877fe17c1bd14b80307c258c864f
|
|
[mq]: mozilla-s390-context.patch
|
|
|
|
diff --git a/js/src/wasm/WasmSignalHandlers.cpp b/js/src/wasm/WasmSignalHandlers.cpp
|
|
--- a/js/src/wasm/WasmSignalHandlers.cpp
|
|
+++ b/js/src/wasm/WasmSignalHandlers.cpp
|
|
@@ -163,16 +163,20 @@ using mozilla::DebugOnly;
|
|
# define R03_sig(p) ((p)->uc_mcontext.__gregs[3])
|
|
# define RFP_sig(p) ((p)->uc_mcontext.__gregs[22])
|
|
# endif
|
|
# if defined(__sun__) && defined(__sparc__)
|
|
# define PC_sig(p) ((p)->uc_mcontext.gregs[REG_PC])
|
|
# define FP_sig(p) ((p)->uc_mcontext.gregs[REG_FPRS])
|
|
# define SP_sig(p) ((p)->uc_mcontext.gregs[REG_SP])
|
|
# endif
|
|
+# if defined(__linux__) && defined(__s390x__)
|
|
+# define GR_sig(p,x) ((p)->uc_mcontext.gregs[x])
|
|
+# define PSWa_sig(p) ((p)->uc_mcontext.psw.addr)
|
|
+# endif
|
|
# elif defined(__NetBSD__)
|
|
# define EIP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EIP])
|
|
# define EBP_sig(p) ((p)->uc_mcontext.__gregs[_REG_EBP])
|
|
# define ESP_sig(p) ((p)->uc_mcontext.__gregs[_REG_ESP])
|
|
# define RIP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RIP])
|
|
# define RSP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RSP])
|
|
# define RBP_sig(p) ((p)->uc_mcontext.__gregs[_REG_RBP])
|
|
# define R11_sig(p) ((p)->uc_mcontext.__gregs[_REG_R11])
|
|
@@ -405,16 +409,20 @@ struct macos_aarch64_context {
|
|
# define PC_sig(p) R32_sig(p)
|
|
# define SP_sig(p) R01_sig(p)
|
|
# define FP_sig(p) R01_sig(p)
|
|
# elif defined(__loongarch__)
|
|
# define PC_sig(p) EPC_sig(p)
|
|
# define FP_sig(p) RFP_sig(p)
|
|
# define SP_sig(p) R03_sig(p)
|
|
# define LR_sig(p) RRA_sig(p)
|
|
+# elif defined(__s390x__)
|
|
+# define PC_sig(p) PSWa_sig(p)
|
|
+# define SP_sig(p) GR_sig(p, 15)
|
|
+# define FP_sig(p) GR_sig(p, 11)
|
|
# endif
|
|
|
|
static void SetContextPC(CONTEXT* context, uint8_t* pc) {
|
|
# ifdef PC_sig
|
|
*reinterpret_cast<uint8_t**>(&PC_sig(context)) = pc;
|
|
# else
|
|
MOZ_CRASH();
|
|
# endif
|