Package: urjtag
Version: 0.10+r2007-1.2
Severity: important

Dear Maintainer,

urjtag 0.10+r2007-1.2 exits with segmentation fault during the detect command,
whereas version 0.10+r2007-1 works fine.

--snip--
jtag> cable usbblaster
Connected to libftdi driver.
jtag> detect
IR length: 14
Chain length: 2
Device Id: 11110101000001000110000010010011 (0xF5046093)
  Manufacturer: Xilinx (0x093)
  Part(0):      xcf04s (0x5046)
  Stepping:     15
  Filename:     /usr/share/urjtag/xilinx/xcf04s/xcf04s
Segmentation fault
--snip--

urjtag is used to program a Nexys2 FPGA board with VOTI FX2-firmware.

The last lines of a ltrace are attached.

Thanks!
Christian



-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (1001, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages urjtag depends on:
ii  libc6         2.19-13
ii  libftdi1      0.20-2
ii  libreadline6  6.3-8+b1
ii  libusb-0.1-4  2:0.1.12-25

urjtag recommends no packages.

urjtag suggests no packages.

-- no debconf information
----
--snip
---
strlen("xcf04s")                                                                
                 = 6
__strncat_chk(0x7fff8305ba00, 0x1c3e430, 20, 21)                                
                 = 0x7fff8305ba00
strrchr("/usr/share/urjtag/xilinx/PARTS", '/')                                  
                 = "/PARTS"
__strncat_chk(0x7fff8305ba40, 0x1c3e450, 998, 1024)                             
                 = 0x7fff8305ba40
__strncat_chk(0x7fff8305ba40, 0x47c956, 992, 1024)                              
                 = 0x7fff8305ba40
malloc(24)                                                                      
                 = 0x1c3e070
malloc(4)                                                                       
                 = 0x1c3d980
memset(0x1c3d980, '\0', 4)                                                      
                 = 0x1c3d980
malloc(5)                                                                       
                 = 0x1c3e1b0
memcpy(0x1c3d980, "\001\001\001\001", 4)                                        
                 = 0x1c3d980
free(0x1c3e450)                                                                 
                 = <void>
free(0x1c3e430)                                                                 
                 = <void>
fopen("/usr/share/urjtag/xilinx/xcf04s/"..., "re")                              
                 = 0x1c3e1d0
malloc(24)                                                                      
                 = 0x1c3e430
malloc(4)                                                                       
                 = 0x1c3e450
memset(0x1c3e450, '\0', 4)                                                      
                 = 0x1c3e450
malloc(5)                                                                       
                 = 0x1c3e510
__getdelim(0x7fff8305b908, 0x7fff8305b910, 10, 0x1c3e1d0)                       
                 = 14
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__rawmemchr(0x1c3e470, 0, 48, 0xa30097334306663)                                
                 = 0x1c3e47d
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
strlen("0000")                                                                  
                 = 4
__rawmemchr(0x1c3e470, 0, 0x6010, 1136)                                         
                 = 0x1c3e474
__getdelim(0x7fff8305b908, 0x7fff8305b910, 10, 0x1c3e1d0)                       
                 = 15
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__rawmemchr(0x1c3e470, 0, 49, 0xa35310973343066)                                
                 = 0x1c3e47e
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
strlen("1111")                                                                  
                 = 4
__rawmemchr(0x1c3e470, 0, 0xc010, 1136)                                         
                 = 0x1c3e474
__ctype_b_loc()                                                                 
                 = 0x7f7782b886a8
__strdup(0x1c3e475, 0x1c3d980, 1, 9)                                            
                 = 0x1c3e410
__strdup(0x1c3e47c, 0x7f7781de3640, 0, 49)                                      
                 = 0x1c3e4f0
free(0x1c3e470)                                                                 
                 = <void>
fclose(0x1c3e1d0)                                                               
                 = 0
free(0x1c3e450)                                                                 
                 = <void>
free(0x1c3e510)                                                                 
                 = <void>
free(0x1c3e430)                                                                 
                 = <void>
free(0x1c3d980)                                                                 
                 = <void>
free(0x1c3e1b0)                                                                 
                 = <void>
free(0x1c3e070)                                                                 
                 = <void>
dcgettext(0, 0x47c973, 5, 0x1c3e1a0)                                            
                 = 0x47c973
__vfprintf_chk(0x7f778203b2a0, 1, 0x47c973, 0x7fff8305b850)                     
                 = 19
fflush(0x7f778203b2a0)                                                          
                 = 0
strlen("15")                                                                    
                 = 2
__strncat_chk(0x7fff8305b9f0, 0x1c3e4f0, 8, 9)                                  
                 = 0x7fff8305b9f0
strrchr("/usr/share/urjtag/xilinx/xcf04s/"..., '/')                             
                 = "/STEPPINGS"
__strncat_chk(0x7fff8305ba40, 0x1c3e410, 991, 1024)                             
                 = 0x7fff8305ba40
dcgettext(0, 0x474c0d, 5, 988)                                                  
                 = 0x474c0d
__vfprintf_chk(0x7f778203b2a0, 1, 0x474c0d, 0x7fff8305b850)                     
                 = 55
fflush(0x7f778203b2a0)                                                          
                 = 0
__strcpy_chk(0x1c3e120, 0x7fff8305ba20, 26, 54)                                 
                 = 0x1c3e120
__strcpy_chk(0x1c3e13a, 0x7fff8305ba00, 21, 0x1c3e13a)                          
                 = 0x1c3e13a
__strcpy_chk(0x1c3e14f, 0x7fff8305b9f0, 9, 0)                                   
                 = 0x1c3e14f
fopen("/usr/share/urjtag/xilinx/xcf04s/"..., "re")                              
                 = 0x1c3e1d0
malloc(168)                                                                     
                 = 0x1c3e530
malloc(208)                                                                     
                 = 0x1c3e5e0
malloc(12)                                                                      
                 = 0x1c3e070
malloc(65544)                                                                   
                 = 0x1c50fa0
malloc(8)                                                                       
                 = 0x1c3e1b0
malloc(72)                                                                      
                 = 0x1c3daa0
malloc(16386)                                                                   
                 = 0x1c3e6c0
__errno_location()                                                              
                 = 0x7f7782b88690
fileno(0x7f778203a888)                                                          
                 = -1
isatty(-1)                                                                      
                 = 0
__errno_location()                                                              
                 = 0x7f7782b88690
fread(0x1c3e6c0, 1, 8192, 0x7f778203a888 <no return ...>
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++

Reply via email to