That does not help unfortunately - just tested again with ulimit -s
unlimited. I dont think we are hitting the stack boundary because sp is
still inside the stack region outlined by pmap. Have you seen the very same
issue as I do?
Am 31.05.2015 19:48 schrieb "Jared McNeill" <[email protected]>:
> Default stack size limits on evbarm are too low for webkit-gtk. Bump it up
> with ulimit -s and the g_dpgettext2 problem should go away.
>
>
>
> On Sun, 31 May 2015, Stephan wrote:
>
> Hi folks,
>>
>> I am currently testing some applications on the RPI 2. Some work
>> pretty well, others not yet. As for webkit-gtk based browsers, I am
>> experiencing crashes from time to time.
>>
>> One problem that occurs often seems to be related to g_dpgettext2 ()
>> from glib2. The top of the stack looks like this:
>>
>> (gdb) bt
>> #0 0x636f7452 in ?? ()
>> #1 0x45ff3fa8 in g_dpgettext2 () from /usr/pkg/lib/libglib-2.0.so.0
>> #2 0x42ad6030 in gtk_stock_lookup () from
>> /usr/pkg/lib/libgtk-x11-2.0.so.0
>> #3 0x42987b98 in gtk_action_set_stock_id () from
>> /usr/pkg/lib/libgtk-x11-2.0.so.0
>> #4 0x45f55cfc in g_object_set_valist () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #5 0x45f5642c in g_object_set () from /usr/pkg/lib/libgobject-2.0.so.0
>> #6 0x4298a27c in gtk_action_group_add_actions_full () from
>> /usr/pkg/lib/libgtk-x11-2.0.so.0
>> #7 0x4298a388 in gtk_action_group_add_actions () from
>> /usr/pkg/lib/libgtk-x11-2.0.so.0
>> #8 0x0004238c in ?? ()
>> #9 0x45f5322c in g_object_new_internal () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #10 0x45f5587c in g_object_new_valist () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #11 0x45f55a24 in g_object_new () from /usr/pkg/lib/libgobject-2.0.so.0
>> #12 0x00043ff0 in ephy_window_new_with_chrome ()
>> #13 0x0003ac94 in ephy_shell_new_tab_full ()
>> #14 0x0003f81c in ?? ()
>> #15 0x40a090e8 in webkit_marshal_OBJECT__OBJECT () from
>> /usr/pkg/lib/libwebkitgtk-1.0.so.0
>> #16 0x45f4e070 in g_closure_invoke () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #17 0x45f6154c in signal_emit_unlocked_R () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #18 0x45f69278 in g_signal_emit_valist () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #19 0x45f69cac in g_signal_emit_by_name () from
>> /usr/pkg/lib/libgobject-2.0.so.0
>> #20 0x409d9074 in
>> WebKit::FrameLoaderClient::dispatchCreatePage(WebCore::NavigationAction
>> const&) () from /usr/pkg/lib/libwebkitgtk-1.0.so.0
>> ...
>>
>> The call to the topmost frame happens from 0x45ff3fa4 in the said
>> funtion. The disassembly from within gdb loos like this:
>>
>> (gdb) disass g_dpgettext2
>> Dump of assembler code for function g_dpgettext2:
>> 0x45ff3f44 <+0>: mov r12, sp
>> 0x45ff3f48 <+4>: push {r4, r5, r6, r7, r8, r9, r10, r11, r12,
>> lr, pc}
>> 0x45ff3f4c <+8>: sub r11, r12, #4
>> 0x45ff3f50 <+12>: sub sp, sp, #12
>> 0x45ff3f54 <+16>: mov r9, r0
>> 0x45ff3f58 <+20>: mov r0, r1
>> 0x45ff3f5c <+24>: mov r6, r2
>> 0x45ff3f60 <+28>: str r1, [r11, #-48] ; 0x30
>> 0x45ff3f64 <+32>: bl 0x45fd3f44
>> 0x45ff3f68 <+36>: mov r5, r0
>> 0x45ff3f6c <+40>: mov r0, r6
>> 0x45ff3f70 <+44>: bl 0x45fd3f44
>> 0x45ff3f74 <+48>: add r10, r5, #1
>> 0x45ff3f78 <+52>: add r8, r0, #1
>> 0x45ff3f7c <+56>: add r3, r8, r10
>> 0x45ff3f80 <+60>: add r3, r3, #14
>> 0x45ff3f84 <+64>: bic r3, r3, #7
>> 0x45ff3f88 <+68>: sub sp, sp, r3
>> 0x45ff3f8c <+72>: mov r3, sp
>> 0x45ff3f90 <+76>: lsr r7, r3, #3
>> 0x45ff3f94 <+80>: lsl r4, r7, #3
>> 0x45ff3f98 <+84>: ldr r1, [r11, #-48] ; 0x30
>> 0x45ff3f9c <+88>: mov r2, r5
>> 0x45ff3fa0 <+92>: mov r0, r4
>> 0x45ff3fa4 <+96>: bl 0x45fd3efc
>> 0x45ff3fa8 <+100>: mov r3, #4
>> 0x45ff3fac <+104>: mov r2, r8
>> 0x45ff3fb0 <+108>: strb r3, [r5, r7, lsl #3]
>> ...
>>
>> Now the jump target actually seems to be some random memory:
>>
>> (gdb) info symbol 0x45fd3efc
>> No symbol matches 0x45fd3efc.
>>
>> At least it is mapped to the text section of libglib2. It decodes like
>> follows which just looks like random garbage:
>>
>> (gdb) x/5i 0x45fd3efc
>> 0x45fd3efc: add r12, pc, #1048576 ; 0x100000
>> 0x45fd3f00: add r12, r12, #4096 ; 0x1000
>> 0x45fd3f04: ldr pc, [r12, #1652]! ; 0x674
>> 0x45fd3f08: add r12, pc, #1048576 ; 0x100000
>> 0x45fd3f0c: add r12, r12, #4096 ; 0x1000
>>
>> The disassembly of g_dpgettext2() from objdump looks weird as well:
>>
>> 00033f44 <g_dpgettext2>:
>> 33f44: e1a0c00d mov ip, sp
>> 33f48: e92ddff0 push {r4, r5, r6, r7, r8, r9, sl,
>> fp, ip, lr, pc}
>> 33f4c: e24cb004 sub fp, ip, #4
>> 33f50: e24dd00c sub sp, sp, #12
>> 33f54: e1a09000 mov r9, r0
>> 33f58: e1a00001 mov r0, r1
>> 33f5c: e1a06002 mov r6, r2
>> 33f60: e50b1030 str r1, [fp, #-48] ; 0x30
>> 33f64: ebff7ff6 bl 13f44 <g_mem_chunk_new-0x7c>
>> 33f68: e1a05000 mov r5, r0
>> 33f6c: e1a00006 mov r0, r6
>> 33f70: ebff7ff3 bl 13f44 <g_mem_chunk_new-0x7c>
>> 33f74: e285a001 add sl, r5, #1
>> 33f78: e2808001 add r8, r0, #1
>> 33f7c: e088300a add r3, r8, sl
>> 33f80: e283300e add r3, r3, #14
>> 33f84: e3c33007 bic r3, r3, #7
>> 33f88: e04dd003 sub sp, sp, r3
>> 33f8c: e1a0300d mov r3, sp
>> 33f90: e1a071a3 lsr r7, r3, #3
>> 33f94: e1a04187 lsl r4, r7, #3
>> 33f98: e51b1030 ldr r1, [fp, #-48] ; 0x30
>> 33f9c: e1a02005 mov r2, r5
>> 33fa0: e1a00004 mov r0, r4
>> 33fa4: ebff7fd4 bl 13efc <g_mem_chunk_new-0xc4>
>> 33fa8: e3a03004 mov r3, #4
>> 33fac: e1a02008 mov r2, r8
>> 33fb0: e7c53187 strb r3, [r5, r7, lsl #3]
>> 33fb4: e1a01006 mov r1, r6
>> 33fb8: e084000a add r0, r4, sl
>> 33fbc: ebff7fce bl 13efc <g_mem_chunk_new-0xc4>
>> 33fc0: e1a00009 mov r0, r9
>> 33fc4: e1a01004 mov r1, r4
>> 33fc8: ebffff8a bl 33df8 <g_dgettext>
>> 33fcc: e1500004 cmp r0, r4
>> 33fd0: e1a08000 mov r8, r0
>>
>> The jumps refer to negative function offsets (for example
>> <g_mem_chunk_new-0x7c>). Glibc (2.42.2) is from pkgsrc from
>> ftp.netbsd.org. I compiled an own one which has exactly the same
>> issue.
>>
>> Ideas?
>>
>>
>>