tags 598956 + pending
thanks

Dear maintainer,

I've prepared an NMU for webkit (versioned as 1.2.5-2.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards.

-- 
 .''`.   http://info.comodo.priv.at/ -- GPG key IDs: 0x8649AA06, 0x00F3CFE4
 : :' :  Debian GNU/Linux user, admin, & developer - http://www.debian.org/
 `. `'   Member of VIBE!AT & SPI, fellow of Free Software Foundation Europe
   `-    NP: Pink Floyd: The trial
diff -Nru webkit-1.2.5/debian/changelog webkit-1.2.5/debian/changelog
--- webkit-1.2.5/debian/changelog	2010-10-21 00:31:57.000000000 +0200
+++ webkit-1.2.5/debian/changelog	2010-11-10 23:35:01.000000000 +0100
@@ -1,3 +1,12 @@
+webkit (1.2.5-2.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add patch 05-fix-jit-on-kfreebsd-i386.patch by Petr Salinger and 
+    Michael Dorrington: Fixes Javascript JIT crashing on kfreebsd-i386
+    (closes: #598956).
+
+ -- gregor herrmann <gre...@debian.org>  Wed, 10 Nov 2010 23:28:55 +0100
+
 webkit (1.2.5-2) unstable; urgency=high
 
   * Unapply 02-pool-fixup-and-sparc-support.patch and
diff -Nru webkit-1.2.5/debian/patches/05-fix-jit-on-kfreebsd-i386.patch webkit-1.2.5/debian/patches/05-fix-jit-on-kfreebsd-i386.patch
--- webkit-1.2.5/debian/patches/05-fix-jit-on-kfreebsd-i386.patch	1970-01-01 01:00:00.000000000 +0100
+++ webkit-1.2.5/debian/patches/05-fix-jit-on-kfreebsd-i386.patch	2010-11-10 23:24:28.000000000 +0100
@@ -0,0 +1,51 @@
+Author: Petr Salinger
+Tester: Michael Dorrington
+Description: Fixes Javascript JIT crashing on kfreebsd-i386.
+ Fixes Javascript JIT issue that causes webkit to crash on kfreebsd-i386,
+ see <http://bugs.debian.org/598956>.
+
+ For reasoning of patch see:
+ "Common practices and problems found when porting to GNU/k*BSD"
+ <http://glibc-bsd.alioth.debian.org/porting/PORTING>
+
+ On kfreebsd-amd64, this issue does not occur.
+
+
+--- webkit-1.2.4/JavaScriptCore/jit/JITOpcodes.cpp	2010-09-03 20:18:02.000000000 +0100
++++ webkit-1.2.4-fix_jit_kfreebsd_i386/JavaScriptCore/jit/JITOpcodes.cpp	2010-10-07 06:09:55.000000000 +0100
+@@ -165,7 +165,7 @@
+      * stack pointer by the right amount after the call.
+      */
+ 
+-#if COMPILER(MSVC) || OS(LINUX)
++#if COMPILER(MSVC) || OS(LINUX) || defined(__GLIBC__)
+ #if COMPILER(MSVC)
+ #pragma pack(push)
+ #pragma pack(4)
+@@ -228,7 +228,7 @@
+     storePtr(regT2, Address(stackPointerRegister, OBJECT_OFFSETOF(NativeCallFrameStructure, thisValue) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)));
+     storePtr(regT3, Address(stackPointerRegister, OBJECT_OFFSETOF(NativeCallFrameStructure, thisValue) + OBJECT_OFFSETOF(JSValue, u.asBits.tag)));
+ 
+-#if COMPILER(MSVC) || OS(LINUX)
++#if COMPILER(MSVC) || OS(LINUX) || defined(__GLIBC__)
+     // ArgList is passed by reference so is stackPointerRegister + 4 * sizeof(Register)
+     addPtr(Imm32(OBJECT_OFFSETOF(NativeCallFrameStructure, result)), stackPointerRegister, X86Registers::ecx);
+ 
+@@ -1689,7 +1689,7 @@
+      * not the rest of the callframe so we need a nice way to ensure we increment the
+      * stack pointer by the right amount after the call.
+      */
+-#if COMPILER(MSVC) || OS(LINUX)
++#if COMPILER(MSVC) || OS(LINUX) || defined(__GLIBC__)
+     struct NativeCallFrameStructure {
+       //  CallFrame* callFrame; // passed in EDX
+         JSObject* callee;
+@@ -1742,7 +1742,7 @@
+     loadPtr(Address(regT1, -(int)sizeof(Register)), regT1);
+     storePtr(regT1, Address(stackPointerRegister, OBJECT_OFFSETOF(NativeCallFrameStructure, thisValue)));
+ 
+-#if COMPILER(MSVC) || OS(LINUX)
++#if COMPILER(MSVC) || OS(LINUX) || defined(__GLIBC__)
+     // ArgList is passed by reference so is stackPointerRegister + 4 * sizeof(Register)
+     addPtr(Imm32(OBJECT_OFFSETOF(NativeCallFrameStructure, result)), stackPointerRegister, X86Registers::ecx);
+ 
diff -Nru webkit-1.2.5/debian/patches/series webkit-1.2.5/debian/patches/series
--- webkit-1.2.5/debian/patches/series	2010-10-21 00:31:57.000000000 +0200
+++ webkit-1.2.5/debian/patches/series	2010-11-10 23:34:11.000000000 +0100
@@ -1,5 +1,6 @@
 02-pool-fixup-and-sparc-support.patch
 04-spoof-user-agent-to-google.patch
+05-fix-jit-on-kfreebsd-i386.patch
 cve-2010-2646.patch
 cve-2010-2651.patch
 cve-2010-2900.patch

Attachment: signature.asc
Description: Digital signature

Reply via email to