chromium-browser FTBFS on arm*

Bug #993080 reported by Micah Gersten
16
This bug affects 1 person
Affects Status Importance Assigned to Milestone
chromium-browser (Ubuntu)
Fix Released
Medium
Cris Dywan
Oneiric
Won't Fix
Medium
Unassigned
Precise
Fix Released
Medium
Unassigned
Quantal
Fix Released
Medium
Cris Dywan

Bug Description

  LINK(target) out/Release/chrome
[keep-alive] Tue May 1 12:44:30 UTC 2012 (407 min) [ Free Mem: 35M Free Swap: 29834M ]
out/Release/obj.target/skia/../skia_opts/third_party/skia/src/opts/opts_check_arm.o: In function `SkMemset16GetPlatformProc()':
opts_check_arm.cpp:(.text._Z25SkMemset16GetPlatformProcv+0x10): undefined reference to `arm_memset16'
out/Release/obj.target/skia/../skia_opts/third_party/skia/src/opts/opts_check_arm.o: In function `SkMemset32GetPlatformProc()':
opts_check_arm.cpp:(.text._Z25SkMemset32GetPlatformProcv+0x10): undefined reference to `arm_memset32'
collect2: ld returned 1 exit status

https://launchpadlibrarian.net/103754735/buildlog_ubuntu-precise-armhf.chromium-browser_18.0.1025.168~r134367-0ubuntu0.12.04.1_FAILEDTOBUILD.txt.gz

A similar error currently affects oneiric armel and precise armel as well

Micah Gersten (micahg)
Changed in chromium-browser (Ubuntu Precise):
importance: Undecided → Medium
status: New → Triaged
Changed in chromium-browser (Ubuntu Oneiric):
importance: Undecided → Medium
status: New → Triaged
Micah Gersten (micahg)
tags: added: arm-porting-queue
Changed in chromium-browser (Ubuntu Quantal):
assignee: nobody → Christian Dywan (kalikiana)
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package chromium-browser - 18.0.1025.168~r134367-0ubuntu1

---------------
chromium-browser (18.0.1025.168~r134367-0ubuntu1) quantal; urgency=low

  * debian/rules
    - include armv7 in GYP_DEFINES for 11.10, 12.04 and 12.10. Fixes
      FTBFS on arm (LP: #993080)
 -- Ken VanDine <email address hidden> Mon, 18 Jun 2012 10:04:59 -0400

Changed in chromium-browser (Ubuntu Quantal):
status: Triaged → Fix Released
Revision history for this message
Bryan Wu (cooloney) wrote :

Christian,

Could you please backport this patch to Precise? We are still meeting FTBFS on ARM for both chromium-browser_18.0.1025.151~r130497-0ubuntu1 and chromium-browser_18.0.1025.168~r134367-0ubuntu0.12.04.1

Thanks,
-Bryan

Revision history for this message
Scott Kitterman (kitterman) wrote :

It built on precise, so verification done.

Changed in chromium-browser (Ubuntu Precise):
status: Triaged → Fix Committed
tags: added: verification-done
Revision history for this message
Scott Kitterman (kitterman) wrote : Update Released

The verification of this Stable Release Update has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regresssions.

Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (7.7 KiB)

This bug was fixed in the package chromium-browser - 20.0.1132.47~r144678-0ubuntu0.12.04.1

---------------
chromium-browser (20.0.1132.47~r144678-0ubuntu0.12.04.1) precise-security; urgency=low

  * New upstream release from the Stable Channel
    This release fixes the following security issues:
    - [118633] Low CVE-2012-2815: Leak of iframe fragment id. Credit to Elie
      Bursztein of Google.
    - [120222] High CVE-2012-2817: Use-after-free in table section handling.
      Credit to miaubiz.
    - [120944] High CVE-2012-2818: Use-after-free in counter layout. Credit to
      miaubiz.
    - [120977] High CVE-2012-2819: Crash in texture handling. Credit to Ken
      “gets” Russell of the Chromium development community.
    - [121926] Medium CVE-2012-2820: Out-of-bounds read in SVG filter handling.
      Credit to Atte Kettunen of OUSPG.
    - [122925] Medium CVE-2012-2821: Autofill display problem. Credit to
      “simonbrown60”.
    - [various] Medium CVE-2012-2822: Misc. lower severity OOB read issues in
      PDF. Credit to awesome ASAN and various Googlers (Kostya Serebryany,
      Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).
    - [124356] High CVE-2012-2823: Use-after-free in SVG resource handling.
      Credit to miaubiz.
    - [125374] High CVE-2012-2824: Use-after-free in SVG painting. Credit to
      miaubiz.
    - [128688] Medium CVE-2012-2826: Out-of-bounds read in texture conversion.
      Credit to Google Chrome Security Team (Inferno).
    - [129857] High CVE-2012-2828: Integer overflows in PDF. Credit to Mateusz
      Jurczyk of Google Security Team with contributions by Gynvael Coldwind of
      Google Security Team and Google Chrome Security Team (Chris Evans).
    - [129947] High CVE-2012-2829: Use-after-free in first-letter handling.
      Credit to miaubiz.
    - [129951] High CVE-2012-2830: Wild pointer in array value setting. Credit
      to miaubiz.
    - [130356] High CVE-2012-2831: Use-after-free in SVG reference handling.
      Credit to miaubiz.
    - [131553] High CVE-2012-2832: Uninitialized pointer in PDF image codec.
      Credit to Mateusz Jurczyk of Google Security Team with contributions by
      Gynvael Coldwind of Google Security Team.
    - [132156] High CVE-2012-2833: Buffer overflow in PDF JS API. Credit to
      Mateusz Jurczyk of Google Security Team.
    - [132779] High CVE-2012-2834: Integer overflow in Matroska container.
      Credit to Jüri Aedla.
    - [127417] Medium CVE-2012-2825: Wild read in XSL handling. Credit to
      Nicholas Gregoire.
    - [64-bit Linux only] [129930] High CVE-2012-2807: Integer overflows in
      libxml. Credit to Jüri Aedla.

    This upload also fixes the following issues from 19.0.1084.52:
    - [117409] High CVE-2011-3103: Crashes in v8 garbage collection. Credit to
      the Chromium development community (Brett Wilson).
    - [118018] Medium CVE-2011-3104: Out-of-bounds read in Skia. Credit to
      Google Chrome Security Team (Inferno).
    - [120912] High CVE-2011-3105: Use-after-free in first-letter handling.
      Credit to miaubiz.
    - [122654] Critical CVE-2011-3106: Browser memory corruption with websockets
      over SSL. Credit to the C...

Read more...

Changed in chromium-browser (Ubuntu Precise):
status: Fix Committed → Fix Released
Revision history for this message
Rolf Leggewie (r0lf) wrote :

oneiric has seen the end of its life and is no longer receiving any updates. Marking the oneiric task for this ticket as "Won't Fix".

Changed in chromium-browser (Ubuntu Oneiric):
status: Triaged → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.