Your message dated Sun, 15 Jan 2017 17:40:39 +0100
with message-id <[email protected]>
and subject line Re: Bug#771677: patches added to Debian source tree
has caused the Debian Bug report #771677,
regarding Segmentation fault during detect
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
771677: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771677
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: urjtag
Version: 0.10+r2007-1.2
Severity: important

Dear Maintainer,

urjtag 0.10+r2007-1.2 exits with segmentation fault during the detect command,
whereas version 0.10+r2007-1 works fine.

--snip--
jtag> cable usbblaster
Connected to libftdi driver.
jtag> detect
IR length: 14
Chain length: 2
Device Id: 11110101000001000110000010010011 (0xF5046093)
  Manufacturer: Xilinx (0x093)
  Part(0):      xcf04s (0x5046)
  Stepping:     15
  Filename:     /usr/share/urjtag/xilinx/xcf04s/xcf04s
Segmentation fault
--snip--

urjtag is used to program a Nexys2 FPGA board with VOTI FX2-firmware.

The last lines of a ltrace are attached.

Thanks!
Christian



-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (1001, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages urjtag depends on:
ii  libc6         2.19-13
ii  libftdi1      0.20-2
ii  libreadline6  6.3-8+b1
ii  libusb-0.1-4  2:0.1.12-25

urjtag recommends no packages.

urjtag suggests no packages.

-- no debconf information
----
--snip
---
strlen("xcf04s")                                                                
                 = 6
__strncat_chk(0x7fff8305ba00, 0x1c3e430, 20, 21)                                
                 = 0x7fff8305ba00
strrchr("/usr/share/urjtag/xilinx/PARTS", '/')                                  
                 = "/PARTS"
__strncat_chk(0x7fff8305ba40, 0x1c3e450, 998, 1024)                             
                 = 0x7fff8305ba40
__strncat_chk(0x7fff8305ba40, 0x47c956, 992, 1024)                              
                 = 0x7fff8305ba40
malloc(24)                                                                      
                 = 0x1c3e070
malloc(4)                                                                       
                 = 0x1c3d980
memset(0x1c3d980, '\0', 4)                                                      
                 = 0x1c3d980
malloc(5)                                                                       
                 = 0x1c3e1b0
memcpy(0x1c3d980, "\001\001\001\001", 4)                                        
                 = 0x1c3d980
free(0x1c3e450)                                                                 
                 = <void>
free(0x1c3e430)                                                                 
                 = <void>
fopen("/usr/share/urjtag/xilinx/xcf04s/"..., "re")                              
                 = 0x1c3e1d0
malloc(24)                                                                      
                 = 0x1c3e430
malloc(4)                                                                       
                 = 0x1c3e450
memset(0x1c3e450, '\0', 4)                                                      
                 = 0x1c3e450
malloc(5)                                                                       
                 = 0x1c3e510
__getdelim(0x7fff8305b908, 0x7fff8305b910, 10, 0x1c3e1d0)                       
                 = 14
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__rawmemchr(0x1c3e470, 0, 48, 0xa30097334306663)                                
                 = 0x1c3e47d
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
strlen("0000")                                                                  
                 = 4
__rawmemchr(0x1c3e470, 0, 0x6010, 1136)                                         
                 = 0x1c3e474
__getdelim(0x7fff8305b908, 0x7fff8305b910, 10, 0x1c3e1d0)                       
                 = 15
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__rawmemchr(0x1c3e470, 0, 49, 0xa35310973343066)                                
                 = 0x1c3e47e
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
strlen("1111")                                                                  
                 = 4
__rawmemchr(0x1c3e470, 0, 0xc010, 1136)                                         
                 = 0x1c3e474
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__strdup(0x1c3e475, 0x1c3d980, 1, 9)                                            
                 = 0x1c3e410
__strdup(0x1c3e47c, 0x7f7781de3640, 0, 49)                                      
                 = 0x1c3e4f0
free(0x1c3e470)                                                                 
                 = <void>
fclose(0x1c3e1d0)                                                               
                 = 0
free(0x1c3e450)                                                                 
                 = <void>
free(0x1c3e510)                                                                 
                 = <void>
free(0x1c3e430)                                                                 
                 = <void>
free(0x1c3d980)                                                                 
                 = <void>
free(0x1c3e1b0)                                                                 
                 = <void>
free(0x1c3e070)                                                                 
                 = <void>
dcgettext(0, 0x47c973, 5, 0x1c3e1a0)                                            
                 = 0x47c973
__vfprintf_chk(0x7f778203b2a0, 1, 0x47c973, 0x7fff8305b850)                     
                 = 19
fflush(0x7f778203b2a0)                                                          
                 = 0
strlen("15")                                                                    
                 = 2
__strncat_chk(0x7fff8305b9f0, 0x1c3e4f0, 8, 9)                                  
                 = 0x7fff8305b9f0
strrchr("/usr/share/urjtag/xilinx/xcf04s/"..., '/')                             
                 = "/STEPPINGS"
__strncat_chk(0x7fff8305ba40, 0x1c3e410, 991, 1024)                             
                 = 0x7fff8305ba40
dcgettext(0, 0x474c0d, 5, 988)                                                  
                 = 0x474c0d
__vfprintf_chk(0x7f778203b2a0, 1, 0x474c0d, 0x7fff8305b850)                     
                 = 55
fflush(0x7f778203b2a0)                                                          
                 = 0
__strcpy_chk(0x1c3e120, 0x7fff8305ba20, 26, 54)                                 
                 = 0x1c3e120
__strcpy_chk(0x1c3e13a, 0x7fff8305ba00, 21, 0x1c3e13a)                          
                 = 0x1c3e13a
__strcpy_chk(0x1c3e14f, 0x7fff8305b9f0, 9, 0)                                   
                 = 0x1c3e14f
fopen("/usr/share/urjtag/xilinx/xcf04s/"..., "re")                              
                 = 0x1c3e1d0
malloc(168)                                                                     
                 = 0x1c3e530
malloc(208)                                                                     
                 = 0x1c3e5e0
malloc(12)                                                                      
                 = 0x1c3e070
malloc(65544)                                                                   
                 = 0x1c50fa0
malloc(8)                                                                       
                 = 0x1c3e1b0
malloc(72)                                                                      
                 = 0x1c3daa0
malloc(16386)                                                                   
                 = 0x1c3e6c0
__errno_location()                                                              
                 = 0x7f7782b88690
fileno(0x7f778203a888)                                                          
                 = -1
isatty(-1)                                                                      
                 = 0
__errno_location()                                                              
                 = 0x7f7782b88690
fread(0x1c3e6c0, 1, 8192, 0x7f778203a888 <no return ...>
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++

--- End Message ---
--- Begin Message ---
On Mon, Dec 19, 2016 at 02:04:06AM +0100, Johann Klammer wrote:
> 
> I've just installed from experimental and it seems to detect ok now. 

Okay, closing this bugreport.


> I can't test anymore, 'coz the board just died, it seems....
> (the traces look rotten)

That is a pitty.


Groeten
Geert Stappers
-- 
Leven en laten leven

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to