chromium-browser FTBFS on arm*

Bug #993080 reported by Micah Gersten on 2012-05-02
This bug affects 1 person
Affects Status Importance Assigned to Milestone
chromium-browser (Ubuntu)
Christian Dywan
Christian Dywan

Bug Description

  LINK(target) out/Release/chrome
[keep-alive] Tue May 1 12:44:30 UTC 2012 (407 min) [ Free Mem: 35M Free Swap: 29834M ]
out/Release/ In function `SkMemset16GetPlatformProc()':
opts_check_arm.cpp:(.text._Z25SkMemset16GetPlatformProcv+0x10): undefined reference to `arm_memset16'
out/Release/ In function `SkMemset32GetPlatformProc()':
opts_check_arm.cpp:(.text._Z25SkMemset32GetPlatformProcv+0x10): undefined reference to `arm_memset32'
collect2: ld returned 1 exit status

A similar error currently affects oneiric armel and precise armel as well

Micah Gersten (micahg) on 2012-05-02
Changed in chromium-browser (Ubuntu Precise):
importance: Undecided → Medium
status: New → Triaged
Changed in chromium-browser (Ubuntu Oneiric):
importance: Undecided → Medium
status: New → Triaged
Micah Gersten (micahg) on 2012-05-04
tags: added: arm-porting-queue
Changed in chromium-browser (Ubuntu Quantal):
assignee: nobody → Christian Dywan (kalikiana)
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package chromium-browser - 18.0.1025.168~r134367-0ubuntu1

chromium-browser (18.0.1025.168~r134367-0ubuntu1) quantal; urgency=low

  * debian/rules
    - include armv7 in GYP_DEFINES for 11.10, 12.04 and 12.10. Fixes
      FTBFS on arm (LP: #993080)
 -- Ken VanDine <email address hidden> Mon, 18 Jun 2012 10:04:59 -0400

Changed in chromium-browser (Ubuntu Quantal):
status: Triaged → Fix Released
Bryan Wu (cooloney) wrote :


Could you please backport this patch to Precise? We are still meeting FTBFS on ARM for both chromium-browser_18.0.1025.151~r130497-0ubuntu1 and chromium-browser_18.0.1025.168~r134367-0ubuntu0.12.04.1


Scott Kitterman (kitterman) wrote :

It built on precise, so verification done.

Changed in chromium-browser (Ubuntu Precise):
status: Triaged → Fix Committed
tags: added: verification-done

The verification of this Stable Release Update has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regresssions.

Launchpad Janitor (janitor) wrote :
Download full text (7.7 KiB)

This bug was fixed in the package chromium-browser - 20.0.1132.47~r144678-0ubuntu0.12.04.1

chromium-browser (20.0.1132.47~r144678-0ubuntu0.12.04.1) precise-security; urgency=low

  * New upstream release from the Stable Channel
    This release fixes the following security issues:
    - [118633] Low CVE-2012-2815: Leak of iframe fragment id. Credit to Elie
      Bursztein of Google.
    - [120222] High CVE-2012-2817: Use-after-free in table section handling.
      Credit to miaubiz.
    - [120944] High CVE-2012-2818: Use-after-free in counter layout. Credit to
    - [120977] High CVE-2012-2819: Crash in texture handling. Credit to Ken
      “gets” Russell of the Chromium development community.
    - [121926] Medium CVE-2012-2820: Out-of-bounds read in SVG filter handling.
      Credit to Atte Kettunen of OUSPG.
    - [122925] Medium CVE-2012-2821: Autofill display problem. Credit to
    - [various] Medium CVE-2012-2822: Misc. lower severity OOB read issues in
      PDF. Credit to awesome ASAN and various Googlers (Kostya Serebryany,
      Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).
    - [124356] High CVE-2012-2823: Use-after-free in SVG resource handling.
      Credit to miaubiz.
    - [125374] High CVE-2012-2824: Use-after-free in SVG painting. Credit to
    - [128688] Medium CVE-2012-2826: Out-of-bounds read in texture conversion.
      Credit to Google Chrome Security Team (Inferno).
    - [129857] High CVE-2012-2828: Integer overflows in PDF. Credit to Mateusz
      Jurczyk of Google Security Team with contributions by Gynvael Coldwind of
      Google Security Team and Google Chrome Security Team (Chris Evans).
    - [129947] High CVE-2012-2829: Use-after-free in first-letter handling.
      Credit to miaubiz.
    - [129951] High CVE-2012-2830: Wild pointer in array value setting. Credit
      to miaubiz.
    - [130356] High CVE-2012-2831: Use-after-free in SVG reference handling.
      Credit to miaubiz.
    - [131553] High CVE-2012-2832: Uninitialized pointer in PDF image codec.
      Credit to Mateusz Jurczyk of Google Security Team with contributions by
      Gynvael Coldwind of Google Security Team.
    - [132156] High CVE-2012-2833: Buffer overflow in PDF JS API. Credit to
      Mateusz Jurczyk of Google Security Team.
    - [132779] High CVE-2012-2834: Integer overflow in Matroska container.
      Credit to Jüri Aedla.
    - [127417] Medium CVE-2012-2825: Wild read in XSL handling. Credit to
      Nicholas Gregoire.
    - [64-bit Linux only] [129930] High CVE-2012-2807: Integer overflows in
      libxml. Credit to Jüri Aedla.

    This upload also fixes the following issues from 19.0.1084.52:
    - [117409] High CVE-2011-3103: Crashes in v8 garbage collection. Credit to
      the Chromium development community (Brett Wilson).
    - [118018] Medium CVE-2011-3104: Out-of-bounds read in Skia. Credit to
      Google Chrome Security Team (Inferno).
    - [120912] High CVE-2011-3105: Use-after-free in first-letter handling.
      Credit to miaubiz.
    - [122654] Critical CVE-2011-3106: Browser memory corruption with websockets
      over SSL. Credit to the C...


Changed in chromium-browser (Ubuntu Precise):
status: Fix Committed → Fix Released
Rolf Leggewie (r0lf) wrote :

oneiric has seen the end of its life and is no longer receiving any updates. Marking the oneiric task for this ticket as "Won't Fix".

Changed in chromium-browser (Ubuntu Oneiric):
status: Triaged → Won't Fix
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers