fix PPC64LE firefox46
authorWolfgang Rosenauer <wr@rosenauer.org>
Wed, 04 May 2016 12:21:34 +0200
branchfirefox46
changeset 913 9f3ecc7dc9e3
parent 911 32eafb4c7b34
child 914 20bd16d68ed2
fix PPC64LE
MozillaFirefox/MozillaFirefox.changes
MozillaFirefox/MozillaFirefox.spec
MozillaFirefox/mozilla-jit_branch64.patch
mozilla-jit_branch64.patch
series
--- a/MozillaFirefox/MozillaFirefox.changes	Fri Apr 29 22:49:12 2016 +0200
+++ b/MozillaFirefox/MozillaFirefox.changes	Wed May 04 12:21:34 2016 +0200
@@ -1,4 +1,10 @@
 -------------------------------------------------------------------
+Tue May  3 15:47:18 UTC 2016 - normand@linux.vnet.ibm.com
+
+- add mozilla-jit_branch64.patch to avoid PowerPC build failure
+  (from bmo#1266366)
+
+-------------------------------------------------------------------
 Wed Apr 27 08:39:28 UTC 2016 - badshah400@gmail.com
 
 - Update mozilla-gtk3_20.patch for Firefox 46.0 (sync to latest
@@ -18,27 +24,29 @@
   * Gtk3 builds not supported at the moment
   security fixes:
   * MFSA 2016-39/CVE-2016-2804/CVE-2016-2806/CVE-2016-2807
+    (boo#977373, boo#977375, boo#977376)
     Miscellaneous memory safety hazards
-  * MFSA 2016-40/CVE-2016-2809 (bmo#1212939)
+  * MFSA 2016-40/CVE-2016-2809 (bmo#1212939, boo#977377)
     Privilege escalation through file deletion by Maintenance Service updater
     (Windows only)
-  * MFSA 2016-41/CVE-2016-2810 (bmo#1229681)
+  * MFSA 2016-41/CVE-2016-2810 (bmo#1229681, boo#977378)
     Content provider permission bypass allows malicious application
     to access data (Android only)
-  * MFSA 2016-42/CVE-2016-2811/CVE-2016-2812 (bmo#1252330, bmo#1261776)
+  * MFSA 2016-42/CVE-2016-2811/CVE-2016-2812
+    (bmo#1252330, bmo#1261776, boo#977379)
     Use-after-free and buffer overflow in Service Workers
-  * MFSA 2016-43/CVE-2016-2813 (bmo#1197901, bmo#2714650)
+  * MFSA 2016-43/CVE-2016-2813 (bmo#1197901, bmo#2714650, boo#977380)
     Disclosure of user actions through JavaScript with motion and
     orientation sensors (only affects mobile variants)
-  * MFSA 2016-44/CVE-2016-2814 (bmo#1254721)
+  * MFSA 2016-44/CVE-2016-2814 (bmo#1254721, boo#977381)
     Buffer overflow in libstagefright with CENC offsets
-  * MFSA 2016-45/CVE-2016-2816 (bmo#1223743)
+  * MFSA 2016-45/CVE-2016-2816 (bmo#1223743, boo#977382)
     CSP not applied to pages sent with multipart/x-mixed-replace
-  * MFSA 2016-46/CVE-2016-2817 (bmo#1227462)
+  * MFSA 2016-46/CVE-2016-2817 (bmo#1227462, boo#977384)
     Elevation of privilege with chrome.tabs.update API in web extensions
-  * MFSA 2016-47/CVE-2016-2808 (bmo#1246061)
+  * MFSA 2016-47/CVE-2016-2808 (bmo#1246061, boo#977386)
     Write to invalid HashMap entry through JavaScript.watch()
-  * MFSA 2016-48/CVE-2016-2820 (bmo#870870)
+  * MFSA 2016-48/CVE-2016-2820 (bmo#870870, boo#977388)
     Firefox Health Reports could accept events from untrusted domains
 
 -------------------------------------------------------------------
--- a/MozillaFirefox/MozillaFirefox.spec	Fri Apr 29 22:49:12 2016 +0200
+++ b/MozillaFirefox/MozillaFirefox.spec	Wed May 04 12:21:34 2016 +0200
@@ -169,6 +169,7 @@
 Patch12:        mozilla-reduce-files-per-UnifiedBindings.patch
 Patch13:        mozilla-gtk3_20.patch
 Patch14:        mozilla-check_return.patch
+Patch15:        mozilla-jit_branch64.patch
 # Firefox/browser
 Patch101:       firefox-kde.patch
 Patch102:       firefox-no-default-ualocale.patch
@@ -283,6 +284,7 @@
 %patch13 -p1
 %endif
 %patch14 -p1
+%patch15 -p1
 # Firefox
 %patch101 -p1
 %patch102 -p1
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/MozillaFirefox/mozilla-jit_branch64.patch	Wed May 04 12:21:34 2016 +0200
@@ -0,0 +1,1 @@
+../mozilla-jit_branch64.patch
\ No newline at end of file
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/mozilla-jit_branch64.patch	Wed May 04 12:21:34 2016 +0200
@@ -0,0 +1,28 @@
+From: Michel Normand <normand@linux.vnet.ibm.com>
+Subject: mozilla add branch64
+Date: Tue, 03 May 2016 17:42:54 +0200
+References:
+https://bugzilla.mozilla.org/show_bug.cgi?id=1266366
+
+mozilla add branch64 in MacroAssembler-none.h
+already upstream as tracked by
+https://www.mail-archive.com/freebsd-gecko@freebsd.org/msg05462.html
+
+Signed-off-by: Michel Normand <normand@linux.vnet.ibm.com>
+---
+ js/src/jit/none/MacroAssembler-none.h |    2 ++
+ 1 file changed, 2 insertions(+)
+
+Index: mozilla/js/src/jit/none/MacroAssembler-none.h
+===================================================================
+--- mozilla.orig/js/src/jit/none/MacroAssembler-none.h
++++ mozilla/js/src/jit/none/MacroAssembler-none.h
+@@ -255,6 +255,8 @@ class MacroAssemblerNone : public Assemb
+     template <typename T, typename S> void branchPrivatePtr(Condition, T, S, Label*) { MOZ_CRASH(); }
+     template <typename T, typename S> void decBranchPtr(Condition, T, S, Label*) { MOZ_CRASH(); }
+     template <typename T, typename S> void branchTest64(Condition, T, T, S, Label*) { MOZ_CRASH(); }
++    template <typename T, typename S> void branch64(Condition, T, S, Label*) { MOZ_CRASH(); }
++    template <typename T, typename S> void branch64(Condition, T, T, S, Label*) { MOZ_CRASH(); }
+     template <typename T, typename S> void mov(T, S) { MOZ_CRASH(); }
+     template <typename T, typename S> void movq(T, S) { MOZ_CRASH(); }
+     template <typename T, typename S> void movePtr(T, S) { MOZ_CRASH(); }
--- a/series	Fri Apr 29 22:49:12 2016 +0200
+++ b/series	Wed May 04 12:21:34 2016 +0200
@@ -12,8 +12,9 @@
 mozilla-no-stdcxx-check.patch
 mozilla-libproxy.patch
 mozilla-reduce-files-per-UnifiedBindings.patch
+mozilla-gtk3_20.patch
 mozilla-check_return.patch
-#mozilla-gtk3_20.patch
+mozilla-jit_branch64.patch
 
 # Firefox patches
 firefox-kde.patch