pvr driver crashes when ubiquity-slideshow starts

Bug #1066046 reported by Paul Larson
26
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Webkit
New
Medium
livecd-rootfs (Ubuntu)
Fix Released
Critical
Oliver Grawert
Quantal
Fix Released
Critical
Oliver Grawert
pvr-omap4 (Ubuntu)
Confirmed
High
Unassigned
Quantal
Won't Fix
High
Unassigned
ubiquity (Ubuntu)
Invalid
Critical
Unassigned
Quantal
Invalid
Critical
Unassigned
webkit (Ubuntu)
Fix Released
High
Unassigned
Quantal
Fix Released
High
Iain Lane

Bug Description

[ Description ]

I think this happened on any page which uses JS. An upstream bug (linked from here) in the JS JIT results in segfaults.

[ Test case ]

On an armhf machine, try

  /usr/lib/webkitgtk-3.0-0/libexec/GtkLauncher "http://news.bbc.co.uk/"

it should briefly open a window and then segfault before the fix, and successfully load the webpage after.

Also try the slideshow that prompted this bug report in the first place

  bzr branch lp:ubiquity-slideshow-ubuntu
  cd ubiquity-slideshow-ubuntu
  ./Slideshow.py --path=build/ubuntu --controls

again you should see a segfault (coming from webkit) before, and a lovely slideshow after.

[ Regression Potential ]

This might make webkit a bit slower on armel/hf. It shouldn't be too bad, but perhaps exercise a bit by browsing around in epiphany-browser to see.

[ Original Description ]

On panda, I'm hitting this crash on the 20121012.2 image for quantal.

ProblemType: Bug
DistroRelease: Ubuntu 12.10
Package: ubiquity 2.12.10
ProcVersionSignature: Ubuntu 3.5.0-213.20-omap4 3.5.5
Uname: Linux 3.5.0-213-omap4 armv7l
ApportVersion: 2.6.1-0ubuntu3
Architecture: armhf
CasperVersion: 1.328
Date: Fri Oct 12 11:26:13 2012
InstallCmdLine: fixrtc quiet splash -- boot=casper only-ubiquity
LiveMediaBuild: Ubuntu 12.10 "Quantal Quetzal" - Release armhf+omap4 (20121012.2)
ProcEnviron:
 TERM=linux
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=<set>
 LANG=en_US.UTF-8
 SHELL=/bin/bash
SourcePackage: ubiquity
UpgradeStatus: No upgrade log present (probably fresh install)

Revision history for this message
In , Dsd-o (dsd-o) wrote :
Download full text (5.1 KiB)

Created attachment 139221
Attempted gdb diagnostics

OLPC is moving from xulrunner to webkit. This is working great on our x86 laptops, but not on our latest ("XO-1.75") ARMv7 laptop.

We are running Fedora 17 with webkitgtk-1.8.1 (GTK3).

On the ARM platform, loading a javascript-heavy webpage causes a crash. Reproduced in Epiphany and OLPC's own "Browse activity" for the Sugar desktop. Reproduces very easily - loading gmail or Google Docs will cause an instant crash most of the time.

Unfortunately gdb is not helpful with the crash. With all relevant debuginfo packages installed:

(gdb) bt
#0 0x00000024 in ?? ()
#1 0x49f0eaf4 in ?? ()
#2 0x49f0eaf4 in ?? ()

The crash can't be reproduced on identical configuration on x86.

WebKit was built with these options:

WebKit was configured with the following options:
Build configuration:
 Enable debugging (slow) : no
 Compile with debug symbols (slow) : no
 Enable debug features (slow) : no
 Enable GCC build optimization : yes
 Code coverage support : no
 Unicode backend : icu
 Font backend : freetype
 Optimized memory allocator : yes
 Accelerated Compositing : no
Features:
 WebGL : yes
 Blob support : yes
 DOM mutation observer support : no
 DeviceOrientation support : no
 Directory upload : no
 Fast Mobile Scrolling : no
 JIT compilation : yes
 Filters support : yes
 Geolocation support : yes
 JavaScript debugger/profiler support : yes
 Gamepad support : no
 MathML support : yes
 Media source : no
 Media statistics : no
 MHTML support : no
 HTML5 channel messaging support : yes
 HTML5 meter element support : yes
 HTML5 microdata support : no
 Page Visibility API support : no
 HTML5 progress element support : yes
 HTML5 client-side session and persistent storage support : yes
 SQL client-side database storage support : yes
 HTML5 datagrid support : no
 HTML5 data transfer items support : no
 HTML5 FileSystem API support : no
 Quota API support : no
 HTML5 sandboxed iframe support : yes
 HTML5 video element support ...

Read more...

Revision history for this message
In , Dsd-o (dsd-o) wrote :

Recompiling webkit with --disable-jit "solves" the issue.

So it seems to be a bug in the ARM JIT. This would also explain why gdb can't tell which library this code is coming from.

Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

This is very interesting from your log:

pc 0x24 0x24

I see you disassembled the content of the link register. Could you disasseble a bit back? For example:

x/i $lr-32, $lr+4

Anyway a reduced test case would also be helpful.

Revision history for this message
In , Dsd-o (dsd-o) wrote :

Thanks for looking at this, Zoltan.

(gdb) x/i $lr-32, $lr+4
   0x49f0eaf8: mov r2, lr
(gdb) x/12i $lr-32
   0x49f0ead4: blx r8
   0x49f0ead8: b 0x49f0d0d0
   0x49f0eadc: mov r0, sp
   0x49f0eae0: str r4, [sp, #3118288] ; 0x60
   0x49f0eae4: ldr r3, [pc, #33757136] ; 0x49f0ed3c
   0x49f0eae8: str r4, [r3]
   0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40
   0x49f0eaf0: blx r8
   0x49f0eaf4: b 0x49f0b164
   0x49f0eaf8: mov r2, lr
   0x49f0eafc: str r2, [r4, #-3118288]
   0x49f0eb00: ldr r8, [pc, #33757136] ; 0x49f0ed48

Finding a less complex webpage that reliably reproduces this is difficult. On other sites we're finding that it crashes, but not always. I'll keep an eye open though.

Revision history for this message
In , Dsd-o (dsd-o) wrote :
Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

> 0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40
> 0x49f0eaf0: blx r8

This should be the culprit. Could you check address 0x49f0ed40? (= $pc + #33757136)

I suspect it will be 0x24

Revision history for this message
In , Dsd-o (dsd-o) wrote :

(gdb) x 0x49f0ed40
0x49f0ed40: 0x41d5d15c

Is that what you're looking for?

Revision history for this message
In , Dsd-o (dsd-o) wrote :

Guessing here, but maybe this is also interesting:

(gdb) x/10i 0x41d5d15c
   0x41d5d15c <_ZN3JSC4Heap9markRootsEb+1536>: eor r9, r9, r9, lsl #12
   0x41d5d160 <_ZN3JSC4Heap9markRootsEb+1540>: eor r9, r9, r9, lsr #7
   0x41d5d164 <_ZN3JSC4Heap9markRootsEb+1544>: eor r9, r9, r9, lsl #2
   0x41d5d168 <_ZN3JSC4Heap9markRootsEb+1548>: eor r9, r9, r9, lsr #20
   0x41d5d16c <_ZN3JSC4Heap9markRootsEb+1552>: orr r9, r9, #1
   0x41d5d170 <_ZN3JSC4Heap9markRootsEb+1556>:
    b 0x41d5d17c <_ZN3JSC4Heap9markRootsEb+1568>
   0x41d5d174 <_ZN3JSC4Heap9markRootsEb+1560>: cmp r1, #0
   0x41d5d178 <_ZN3JSC4Heap9markRootsEb+1564>:
    beq 0x41d5d1dc <_ZN3JSC4Heap9markRootsEb+1664>
   0x41d5d17c <_ZN3JSC4Heap9markRootsEb+1568>: cmp r2, #0
   0x41d5d180 <_ZN3JSC4Heap9markRootsEb+1572>: moveq r2, r9

Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

> Is that what you're looking for?

Yeah, if the constants are not changed. I mean pc+#33757136 can be different if you rerun the program.

0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40

Anyway, this is clearly a rubish not a valid function:

   0x41d5d15c <_ZN3JSC4Heap9markRootsEb+1536>: eor r9, r9, r9, lsl #12
   0x41d5d160 <_ZN3JSC4Heap9markRootsEb+1540>: eor r9, r9, r9, lsr #7

This is clearly a fallbackpath:

   0x49f0eadc: mov r0, sp
   0x49f0eae0: str r4, [sp, #3118288] ; 0x60
   0x49f0eae4: ldr r3, [pc, #33757136] ; 0x49f0ed3c
   0x49f0eae8: str r4, [r3]
   0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40
   0x49f0eaf0: blx r8
   0x49f0eaf4: b 0x49f0b164

Question is, what pc+#33757136 should contain in the right case. Btw is webkitgtk-1.8.1 contains the latest trunk? I mean this might already been fixed...

Ah an idea! Instead of x/i write it as x/x and the x/x number again. I mean lets pc+#33757136 be 0x49f0ed40. Type x/x 0x49f0ed40 it will write you a number. x/x that number again, and tell me what it is.

Revision history for this message
In , Dsd-o (dsd-o) wrote :

I'm working from the same core dump so nothing should change.

Yes, I agree it looks strange that it is jumping right into the middle of a function.

(gdb) x/x 0x49f0ed40
0x49f0ed40: 0x41d5d15c
(gdb) x/x 0x41d5d15c
0x41d5d15c <_ZN3JSC4Heap9markRootsEb+1536>: 0xe0299609

I'm not in a good position to test webkit trunk at the moment. I will try to build it on Wednesday.

In the mean time please let me know if you have any other ideas.

Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

> Yes, I agree it looks strange that it is jumping right into the middle of a function.

Unlikely. I think this is simply the closest symbol gdb can find. 1536 is just too big.

Could you check the other constants? These are fallback functions, following each other one-by-one:

   0x49f0ead4: blx r8
   0x49f0ead8: b 0x49f0d0d0
--- fallback
   0x49f0eadc: mov r0, sp
   0x49f0eae0: str r4, [sp, #3118288] ; 0x60
   0x49f0eae4: ldr r3, [pc, #33757136] ; 0x49f0ed3c
   0x49f0eae8: str r4, [r3]
   0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40
   0x49f0eaf0: blx r8
   0x49f0eaf4: b 0x49f0b164
--- fallback
   0x49f0eaf8: mov r2, lr
   0x49f0eafc: str r2, [r4, #-3118288]
   0x49f0eb00: ldr r8, [pc, #33757136] ; 0x49f0ed48

They all have such sequence:
   0x49f0eaec: ldr r8, [pc, #33757136] ; 0x49f0ed40
   0x49f0eaf0: blx r8

Could you check whether their constant points to a valid function? So this is the only exception or something totally messed up in the constant pool.

Revision history for this message
In , Dsd-o (dsd-o) wrote :

Sorry, think I've wasted a bit of your time.
It looks like I had installed a different webkit build since the crash, and this was affecting the gdb output.

Putting the right build back (the one from which the core was captured), I get different output.

So, stepping back a bit.
lr is still 0x49f0eaf4

The preceding instructions:

   0x49f0ead0: ldr r8, [pc, #26091512] ; 0x49f0ed34
   0x49f0ead4: blx r8
   0x49f0ead8: b 0x49f0d0d0
   0x49f0eadc: mov r0, sp
   0x49f0eae0: str r4, [sp, #3118288] ; 0x60
   0x49f0eae4: ldr r3, [pc, #26091512] ; 0x49f0ed3c
   0x49f0eae8: str r4, [r3]
   0x49f0eaec: ldr r8, [pc, #26091512] ; 0x49f0ed40
   0x49f0eaf0: blx r8
   0x49f0eaf4: b 0x49f0b164

So, value of 0x49f0ed40

(gdb) x/x 0x49f0ed40
0x49f0ed40: 0x41d5d15c

Nothing new until now. But lets look at that code with the right library in place:

   0x41d5d15c <cti_op_get_by_id_proto_fail+8>:
    ldr lr, [sp, #3118288] ; 0x40
   0x41d5d160 <cti_op_get_by_id_proto_fail+12>: mov pc, lr
   0x41d5d164 <cti_op_get_by_id_array_fail>:
    str lr, [sp, #3118288] ; 0x40
   0x41d5d168 <cti_op_get_by_id_array_fail+4>: bl 0x41cae2e8

This looks suspicious. Does it tell you anything?

Just to compare, the previous fallback condition is:
   0x49f0ead0: ldr r8, [pc, #26091512] ; 0x49f0ed34
   0x49f0ead4: blx r8

(gdb) x/x 0x49f0ed34
0x49f0ed34: 0x41d5d1ac
(gdb) x/4i 0x41d5d1ac
   0x41d5d1ac <cti_op_del_by_id+8>: ldr lr, [sp, #3118288] ; 0x40
   0x41d5d1b0 <cti_op_del_by_id+12>: mov pc, lr
   0x41d5d1b4 <cti_op_mul>: str lr, [sp, #3118288] ; 0x40
   0x41d5d1b8 <cti_op_mul+4>: bl 0x41caf998

Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

No problem. This is entirely different now.

> Nothing new until now. But lets look at that code with the right library in place:
>
> 0x41d5d15c <cti_op_get_by_id_proto_fail+8>:
> ldr lr, [sp, #3118288] ; 0x40
> 0x41d5d160 <cti_op_get_by_id_proto_fail+12>: mov pc, lr
> 0x41d5d164 <cti_op_get_by_id_array_fail>:
> str lr, [sp, #3118288] ; 0x40
> 0x41d5d168 <cti_op_get_by_id_array_fail+4>: bl 0x41cae2e8
>
> This looks suspicious. Does it tell you anything?

Yeah it is really suspicious. The sequence should look like this:

str lr, [sp, ...]
bl ...
ldr lr, [sp, ...]
mov pc, lr

Generated by:

#define DEFINE_STUB_FUNCTION(rtype, op) \
    extern "C" { \
        rtype JITStubThunked_##op(STUB_ARGS_DECLARATION); \
    }; \
    asm ( \
        ".globl " SYMBOL_STRING(cti_##op) "\n" \
        SYMBOL_STRING(cti_##op) ":" "\n" \
        "str lr, [sp, #" STRINGIZE_VALUE_OF(THUNK_RETURN_ADDRESS_OFFSET) "]" "\n" \
        "bl " SYMBOL_STRING(JITStubThunked_##op) "\n" \
        "ldr lr, [sp, #" STRINGIZE_VALUE_OF(THUNK_RETURN_ADDRESS_OFFSET) "]" "\n" \
        "mov pc, lr" "\n" \
        ); \
    rtype JITStubThunked_##op(STUB_ARGS_DECLARATION)

and

#define THUNK_RETURN_ADDRESS_OFFSET 0x38

(so #3118288 is somewhat way too big for me)

In other words, something added 8 to the offset of these so called "stubs". Same as the second function. Question is why... Perhaps a very simple web page with simple JS with calling fallbacks like could also reveal this error:

<script>
var a = {}; a["a"]=5;
</script>

Revision history for this message
In , Dsd-o (dsd-o) wrote :
Download full text (4.7 KiB)

Working from home today, with a different laptop.
So not using the same trace as earlier. Lets start over with a new crash.

(gdb) bt
#0 0x000013e4 in ?? ()
#1 0x499fe5dc in ?? ()
#2 0x499fe5dc in ?? ()
Backtrace stopped: previous frame identical to this frame (corrupt stack?)
(gdb) info registers
r0 0x4996e240 1234625088
r1 0xfffffffb 4294967291
r2 0x4996e240 1234625088
r3 0xfffffffb 4294967291
r4 0x47626688 1197631112
r5 0x1d2 466
r6 0x47626588 1197630856
r7 0x5357c57c 1398261116
r8 0x41d9f3e4 1104802788
r9 0x47626570 1197630832
r10 0x45a67400 1168536576
r11 0x41f55058 1106595928
r12 0x4c1d0ab0 1276971696
sp 0xbe8aed78 0xbe8aed78
lr 0x499fe5dc 1235215836
pc 0x13e4 0x13e4
cpsr 0x600f0010 1611595792

Check around the LR area again:
(gdb) x/12i $lr-32
   0x499fe5bc: mov r0, sp
   0x499fe5c0: str r4, [sp, #3118288] ; 0x60
   0x499fe5c4: mov r8, #408 ; 0x198
   0x499fe5c8: str r8, [r4, #-3118288] ; 0x2c
   0x499fe5cc: ldr r3, [pc, #12638680] ; 0x499fea40
   0x499fe5d0: str r4, [r3]
   0x499fe5d4: ldr r8, [pc, #12638680] ; 0x499fea44
   0x499fe5d8: blx r8
   0x499fe5dc: str r0, [r4, #3118288] ; 0x70
   0x499fe5e0: str r1, [r4, #3118288] ; 0x74
   0x499fe5e4: b 0x499fc264
   0x499fe5e8: b 0x499fe618

Looking carefully at this instruction:
   0x499fe5d4: ldr r8, [pc, #12638680] ; 0x499fea44

Lets try this calculation by hand. PC is always 8 bytes ahead of the current instruction, so pc=0x499fe5d4 + 8.
Then we add 12638680, and we read from that memory location.

0x499fe5d4 + 8 + 12638680 = 0x4a60bfb4 so:

(gdb) x/x 0x4a60bfb4
0x4a60bfb4: 0x00000000
Hmm, unlikely.

But gdb's annotation said 0x499fea44.

After asking around a bit I've been told that the number inside the square brackets is not to be taken literally. It includes flags and other things. However, the address in the annotation can be trusted.

So, lets check the memory at that address.

(gdb) x/x 0x499fea44
0x499fea44: 0x41d9f3e4
(gdb) x/4i 0x41d9f3e4
   0x41d9f3e4 <cti_op_resolve_global>: str lr, [sp, #3118288] ; 0x40
   0x41d9f3e8 <cti_op_resolve_global+4>: bl 0x41cf4aac
   0x41d9f3ec <cti_op_resolve_global+8>:
    ldr lr, [sp, #3118288] ; 0x40
   0x41d9f3f0 <cti_op_resolve_global+12>: mov pc, lr

And lets also recall that r8 was programmed with this address before we branched. Checking back to the original register dump, r8=0x41d9f3e4 which is the same as cti_op_resolve_global. Things are making some sense.

The offset in the str/ldr lr lines of 3118288 is huge of course. Again I think we have to ignore it. I think the offset being used is 0x40, as shown by the comment.

Now lets think about the value of lr. It got set as 0x499fe5dc because of the "blx r8" that we followed earlier. Now almost immediately inside cti_op_resolve_global we call "bl", which will change the value of lr. However, lr does *not* reflect the return location for the "bl 0x41cf4aac" call. This means either:
 1. We crashed before executing the bl inside cti_op_resolve_global (seems impossible), or
 2. We executed t...

Read more...

Revision history for this message
In , Hojong-han (hojong-han) wrote :

I don't know exactly what's going on here but I experienced that this kind of crash, related to lr and pc values, could be occurred when cache flush was not run in the requested range.

Revision history for this message
In , Zherczeg-i (zherczeg-i) wrote :

> Now lets think about the value of lr. It got set as 0x499fe5dc because of the "blx r8" that we followed earlier. Now almost immediately inside cti_op_resolve_global we call "bl", which will change the value of lr. However, lr does *not* reflect the return location for the "bl 0x41cf4aac" call. This means either:
> 1. We crashed before executing the bl inside cti_op_resolve_global (seems impossible), or
> 2. We executed the bl inside cti_op_resolve_global, and then restored lr, and returned. (seems likely)

This makes sense, and there is a third option. Actually the purpose of such stub code is allowing returning to anywhere in JIT, mainly used by exception handlers. So the return value is stored on the stack (like x86), can be changed (like a buffer overflow attack, but this is intentional here) so the c++ function can return anywhere, including a catch handler.

So we have two new options:
1) A wrong handler was set
2) Something overwrites the return value

Would be good to know if an exception occures just before the return...

Perhaps the following code also crashes:

try {
  var a = "a";
  a++;
} catch(e) { }

Revision history for this message
In , Dsd-o (dsd-o) wrote :

(In reply to comment #15)
> Would be good to know if an exception occures just before the return...

How can I check this?

> Perhaps the following code also crashes:
>
> try {
> var a = "a";
> a++;
> } catch(e) { }

No crash, unfortunately.

Just FYI, I have a feeling that finding a simplistic test case will be difficult. Sometimes when the crash happens, I go back to the same page and it loads just fine without crashing. gmail seems to cause the crash every time, but sometimes it takes a good few seconds longer than normal before the crash happens.

Also, when I run epiphany under gdb, the crash is very hard to reproduce, even on gmail. (thats why I've been mostly working with core dumps)

Revision history for this message
In , Dsd-o (dsd-o) wrote :

This has also been reproduced on a trimslice (also running as armv7hl). We'll disable the ARM JIT in Fedora for the time being in order to avoid this crash.

If anyone with the right experience is interested in working on this issue, we can ship hardware. Send me an email if interested.

Revision history for this message
In , Simon Schampijer (qpaydhd-si42b-44ecklp) wrote :

The workaround we were using to disable the ARM JIT in Fedora does not work anymore because the Heap code now requires JIT to be enabled (building 1.9.5). So the situation is a bit chicken and egg now. Has there been any progress on the original issue?

Revision history for this message
Paul Larson (pwlars) wrote :
Revision history for this message
C de-Avillez (hggdh2) wrote :

I am getting a variation of this -- after I enter user data, the screen empties, leaving just the background and a blinking watch pointer

Changed in ubiquity (Ubuntu):
status: New → Confirmed
importance: Undecided → Critical
Revision history for this message
Oliver Grawert (ogra) wrote :

switching to console before running the install and purging ubiquity-slideshow-ubuntu fixes the issue, apparently the new webkit tears down the pvr driver

Changed in ubiquity (Ubuntu):
status: Confirmed → Invalid
Changed in webkit (Ubuntu):
status: New → Confirmed
Changed in pvr-omap4 (Ubuntu):
status: New → Confirmed
summary: - ubiquity crashes after user info screen on panda
+ pvr driver crashes when ubiquity-slideshow starts
Revision history for this message
Oliver Grawert (ogra) wrote :

i applied a seed change that removes teh slideshow from all arm images, that should work around it for now

Changed in pvr-omap4 (Ubuntu):
importance: Undecided → High
Changed in webkit (Ubuntu):
importance: Undecided → High
Revision history for this message
Oliver Grawert (ogra) wrote :

this seems to affect all flavours on all arm hardware, the ubuntu slideshow also needs to be removed in preinstalled images, adding a livecd-rootfs task for this.

having it crash on a tegra ac100 netbook crashes the installer but not X like on omap4 with the pvr driver, i get an error message there and am properly put into a rootshell afterwards.

Changed in livecd-rootfs (Ubuntu):
importance: Undecided → Critical
assignee: nobody → Oliver Grawert (ogra)
Changed in livecd-rootfs (Ubuntu Quantal):
milestone: none → ubuntu-12.10
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package livecd-rootfs - 2.92

---------------
livecd-rootfs (2.92) quantal; urgency=low

  * disable all slideshows on al preinstalled images, due to (LP: #1066046)
    the installer crashes when trying to start up webkit for teh slideshow
 -- Oliver Grawert <email address hidden> Sat, 13 Oct 2012 11:44:52 +0200

Changed in livecd-rootfs (Ubuntu Quantal):
status: New → Fix Released
Revision history for this message
Dimitri John Ledkov (xnox) wrote :

Also note without the slideshow the final install stage is ugly. See this screenshot:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1066270/+attachment/3397192/+files/Screen1.png

Changed in webkit (Ubuntu Quantal):
milestone: none → quantal-updates
Iain Lane (laney)
description: updated
Iain Lane (laney)
description: updated
Changed in webkit:
importance: Unknown → Medium
status: Unknown → New
Revision history for this message
Brian Murray (brian-murray) wrote :

This has not yet been fixed in Raring and the SRU can not proceed until it has.

Revision history for this message
Clint Byrum (clint-fewbar) wrote :

Hi Laney, I've assigned you to this bug since you are the uploader of webkit in the quantal-proposed queue. Please note that this needs to be fixed in raring before it can proceed into quantal. Thanks!

Changed in webkit (Ubuntu Quantal):
assignee: nobody → Iain Lane (laney)
Revision history for this message
Iain Lane (laney) wrote :

I was kind of hoping to avoid multiple webkit uploads and to just copy the SRU up to raring as the versions are the same. But oh well, to make the best of the situation I've just uploaded the new point release to raring. You should be good to accept the SRU.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package webkit - 1.10.1-0ubuntu2

---------------
webkit (1.10.1-0ubuntu2) raring; urgency=low

  * Fix symbol files (stupid size_t).
 -- Iain Lane <email address hidden> Fri, 16 Nov 2012 17:25:39 +0000

Changed in webkit (Ubuntu):
status: Confirmed → Fix Released
Revision history for this message
Mairo Pedrini (mpedrini) wrote :

Is there a stack trace of the crash? I am curious if this could be the same issue I'm seeing with a powerpc machine. Some pages (sourceforge's project page, for one) crashed midori, uzbl and GtkLauncher, and upon examining the stack trace, found it to be in libjavascriptcoregtk. Sorry if this is the wrong place to ask.

Revision history for this message
Adam Conrad (adconrad) wrote : Please test proposed package

Hello Paul, or anyone else affected,

Accepted webkit into quantal-proposed. The package will build now and be available at http://launchpad.net/ubuntu/+source/webkit/1.10.0-0ubuntu1.1 in a few hours, and then in the -proposed repository.

Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users.

If this package fixes the bug for you, please change the bug tag from verification-needed to verification-done. If it does not, change the tag to verification-failed. In either case, details of your testing will help us make a better decision.

Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance!

Changed in webkit (Ubuntu Quantal):
status: Confirmed → Fix Committed
tags: added: verification-needed
Revision history for this message
Dimitri John Ledkov (xnox) wrote :

Bug is present in quantal-release, upgrading libwebkitgtk-3.0-common, libwebkitgtk-3.0-0 and libjavascriptcoregtk-3.0-0 to the version 1.10.0-0ubuntu1.1 makes it possible to render webpages with webkit launcher, including news.bbc.co.uk.

tags: added: verification-done
removed: verification-needed
Revision history for this message
Scott Kitterman (kitterman) wrote : Update Released

The verification of this Stable Release Update has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regresssions.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package webkit - 1.10.0-0ubuntu1.1

---------------
webkit (1.10.0-0ubuntu1.1) quantal-proposed; urgency=low

  * Disable JIT (--disable-jit) on armel/armhf, as there is a segfault in this
    code on pages that use javascript (the Ubuntu slideshow for example). (LP:
    #1066046)
 -- Iain Lane <email address hidden> Tue, 30 Oct 2012 13:28:53 +0000

Changed in webkit (Ubuntu Quantal):
status: Fix Committed → Fix Released
Revision history for this message
Rolf Leggewie (r0lf) wrote :

quantal has seen the end of its life and is no longer receiving any updates. Marking the quantal task for this ticket as "Won't Fix".

Changed in pvr-omap4 (Ubuntu Quantal):
status: Confirmed → Won't Fix
Revision history for this message
In , 13007199500-z (13007199500-z) wrote :
Download full text (5.5 KiB)

Comment on attachment 139221
Attempted gdb diagnostics

>Program terminated with signal 11, Segmentation fault.
>#0 0x00000024 in ?? ()
>(gdb) info threads
> Id Target Id Frame
> 7 Thread 0x465562a0 (LWP 1582) 0x424c8a14 in nanosleep ()
> from /lib/libc.so.6
> 6 Thread 0x458ff2a0 (LWP 1581) 0x424f7fa8 in __GI___poll (fds=0x45a02398,
> nfds=3, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87
> 5 Thread 0x46e562a0 (LWP 1583) 0x42419ee4 in __pthread_cond_wait (
> cond=0x46564cf8, mutex=0x0) at pthread_cond_wait.c:156
> 4 Thread 0x476562a0 (LWP 1585) 0x4241a2b0 in __pthread_cond_timedwait (
> cond=0x465bea30, mutex=0x0, abstime=0x47655bc0)
> at pthread_cond_timedwait.c:168
> 3 Thread 0x48edf2a0 (LWP 1627) 0x4241a2b0 in __pthread_cond_timedwait (
> cond=0x3a7438, mutex=0x0, abstime=0x48edeb88)
> at pthread_cond_timedwait.c:168
> 2 Thread 0x44f812a0 (LWP 1580) 0x424f7fa8 in __GI___poll (fds=0x45000c78,
> nfds=1, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:87
>* 1 Thread 0x442e0000 (LWP 1579) 0x00000024 in ?? ()
>(gdb) bt
>#0 0x00000024 in ?? ()
>#1 0x49f0eaf4 in ?? ()
>#2 0x49f0eaf4 in ?? ()
>Backtrace stopped: previous frame identical to this frame (corrupt stack?)
>(gdb) info registers
>r0 0x47657920 1197832480
>r1 0x476579f0 1197832688
>r2 0x4ecb6a20 1321953824
>r3 0x47657938 1197832504
>r4 0x47657920 1197832480
>r5 0x1ef 495
>r6 0x47657588 1197831560
>r7 0x4a0516e0 1241847520
>r8 0x41d5d15c 1104531804
>r9 0x47657570 1197831536
>r10 0x465bd400 1180423168
>r11 0x41f13060 1106325600
>r12 0x41f0fd40 1106312512
>sp 0xbe883040 0xbe883040
>lr 0x49f0eaf4 1240525556
>pc 0x24 0x24
>cpsr 0x200f0010 537853968
>(gdb) x/i 0x49f0eaf4
> 0x49f0eaf4: b 0x49f0b164
>(gdb) x/100i 0x49f0b164
> 0x49f0b164: mov r8, #0
> 0x49f0b168: str r8, [r4]
> 0x49f0b16c: mvn r8, #3
> 0x49f0b170: str r8, [r4, #3118288]
> 0x49f0b174: mov r8, #0
> 0x49f0b178: str r8, [r4, #3118288]
> 0x49f0b17c: mvn r8, #3
> 0x49f0b180: str r8, [r4, #3118288]
> 0x49f0b184: mov r8, #0
> 0x49f0b188: str r8, [r4, #3118288]
> 0x49f0b18c: mvn r8, #3
> 0x49f0b190: str r8, [r4, #3118288]
> 0x49f0b194: mov r8, #0
> 0x49f0b198: str r8, [r4, #3118288]
> 0x49f0b19c: mvn r8, #3
> 0x49f0b1a0: str r8, [r4, #3118288]
> 0x49f0b1a4: mov r8, #0
> 0x49f0b1a8: str r8, [r4, #3118288]
> 0x49f0b1ac: mvn r8, #3
> 0x49f0b1b0: str r8, [r4, #3118288] ; 0x24
> 0x49f0b1b4: mov r8, #0
> 0x49f0b1b8: str r8, [r4, #3118288] ; 0x28
> 0x49f0b1bc: mvn r8, #3
> 0x49f0b1c0: str r8, [r4, #3118288] ; 0x2c
> 0x49f0b1c4: mov r8, #0
> 0x49f0b1c8: str r8, [r4, #3118288] ; 0x30
> 0x49f0b1cc: mvn r8, #3
> 0x49f0b1d0: str r8, [r4, #3118288] ; 0x34
> 0x49f0b1d4: mov r8, #0
> 0x49f0b1d8: str r8, [r4, #3118288] ; 0x38
> 0x49f0b1dc: mvn r8, #3
> 0x49f0b1e0: str r8, [r4, #3118288] ; 0x3c
> 0x49f0b1e4: mov r8, #0
> 0x49f0b1e8: str r8, [r4, #3118288] ; 0x40
> 0x49f0b1ec: mvn r8, #3
> 0x49f0b1f0: str r8, [r4, #31...

Read more...

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.