[Bug 1547152] Re: ltrace is throwing segfault while running any of the userspace command
Launchpad Bug Tracker
1547152 at bugs.launchpad.net
Tue Apr 12 06:50:28 UTC 2016
This bug was fixed in the package ltrace - 0.7.3-5.1ubuntu4
---------------
ltrace (0.7.3-5.1ubuntu4) xenial; urgency=medium
* debian/patches/LP1547152.diff: removed.
* Backport more ppc64el fixes to fix tracing on PPC64; backporting the
required bits and pieces from the rest of ltrace (LP: #1547152, #1398143)
- add_irelative_tracing_b420a226.patch: add support for IRELATIVE tracing.
- find_irelative_b061bae3.patch: split the function
linux_elf_find_irelative_name out of linux_elf_add_plt_entry_irelative
- keep_plt_reloc_in_vector_673ff510.patch: keep PLT relocs in a vector.
- add_elf_each_symbol_7a29f9e7.patch: add elf_each_symbol function for
iteration.
- add_elf_can_read_next_5c37171a.patch: add the elf_can_read_next method.
- add_elf_read_next_u_439ab5bf.patch: add methods for doing stream-like
reads for various types.
- add_elf_read_u8_3c636fb7.patch: add read for u8.
- elf_read_uleb128_184779e4.patch: add elf_read_*_uleb128.
- elf_load_dynamic_entry_4f2f66e6.patch: add function load_dynamic_entry.
- arm_attr_decoding_df7d2311.patch: implement ARM attribute decoding,
this can determine when hardfp is used in the process.
- arm_fetch_backend_97a25160.patch: add fetch backend for float and double
return values on ARM.
- arm_backend_fixes_1383e5bd.patch: misc ARM backend fixes.
- arm_bpc_62fc7747.patch: implement Base Procedure Call Standard.
- arm_vfp_params_1c8596d4.patch: implement VFP parameter passing for ARM.
- arm_vararg_without_vfp_88a0fe50.patch: we need to handle varargs in ARM
without VFP.
- arm_plt_rel_9e33f5ac.patch: unbreak ARM wrt the previous patch, relplt
got removed from struct rtelf; so fix this to still work.
- dont_ltelf_destroy_if_init_fails_0ba3c5ee.patch: don't call
ltelf_destroy if ltelf_init fails (ie. for ENOENT).
- ppc64el.diff: backported eea4ad2c to replace the patch that was already
there, as it includes support for irelative and wchar.
- jmp_irel.patch: backport 73b85aad: support tracing P_PPC64_JMP_IREL.
- ppc64le-fixes.patch: more misc backports for ppc64 fixes, patch from
Fedora packaging git.
+ [35a9677d] fix bugs in fetch backend of powerpc64le
+ [a46c07fc] Fix coding style in PowerPC's arch.h
+ [44789e1e] PowerPC: convert ELFv2 conditionals from preprocessor to
plain conditions.
- ppc64-fork.patch: backport 35742523: Fix tracing across fork on PPC64.
- on_install_breakpoint_56134ff5.patch: ensure we do have the on_install
breakpoint needed for the unprelink patch.
- ppc64-unprelink.patch: backport a0093ca4: Don't crash untraced calls via
PLT in prelinked PPC64 binaries.
- ppc-bias.patch: backport three commits for bias and unresolved breakports
in PPC:
+ [bf821009] Fix address biasing in PPC backend
+ [d80c5371] Fix cloning of PPC_PLT_NEED_UNRESOLVE breakpoints
+ [d8f1287b] Nits
-- Mathieu Trudel-Lapierre <cyphermox at ubuntu.com> Wed, 06 Apr 2016
18:58:54 -0400
** Changed in: ltrace (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to ltrace in Ubuntu.
https://bugs.launchpad.net/bugs/1547152
Title:
ltrace is throwing segfault while running any of the userspace command
Status in ltrace package in Ubuntu:
Fix Released
Bug description:
== Comment: #0 - Praveen K. Pandey <Praveen.Pandey at in.ibm.com> - 2016-01-25 01:18:25 ==
Hi ,
I Installed Ubuntu16.04 In PowerNV and try to run ltrace ls or
ltrace ps it will fail with segfault .
Reproducible Step :
1- Install Ubuntu16.04 in PowerNV or as KVM or as PowerVM
2- Install ltrace package
3- Try to run ltrace with any userspace utility like "ltrace ps"
Actual Result :
Throw Seg fault
Expected :
LOG
root at lep8d:~# uname -a
Linux lep8d 4.3.0-7-generic #18-Ubuntu SMP Tue Jan 19 15:47:35 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux
root at lep8d:~#
root at lep8d:~# ltrace ps
__printf_chk(1, 0x3fffe4d40028, 0x3fffe4d40038, 0x3fffe4d400e0 <unfinished ...>
qsort(0x10017850, 0, 0, 0x3fffe4d400e0) = <void>
__gmon_start__(0x3fffe4d4f8df, 47, 0, 0x3fff81c51d68) = 0
ferror(0x6) = 230428656
__libc_start_main(0x10017e10, 0x10017df8, 0x3fff81d68f48, 0x3fff81d68f38) = 0x3fff81c1ccb0
readproctab3(0x10017e10, 24, 0x7000000000000000, 0x6c00000000000000) = 0x1000dbc1040
uptime(0x3fffe4d3faf0, 0, 152, 103) = 0x3fffe4d3faf0
__fpending(0x3fffe4d3faf8, 0, 152, 103) = 0
strrchr("\037 !"#$%&'()*+,-./0123456789:;<=>"..., '\360') = nil
escape_command(0x10030f50, 0x3fffe4d3f968, 0, 8) = 0
setlocale(LC_NUMERIC, "hijklmnopqrstuvwxyz{|}~\177\200\201\202\203\204\205\206\207"...) = nil
select(1, 0x40087468, 0x3fffe4d3fa00, 0) = 1
__xstat(268534584, "\017", 0x13) = 0
strncmp("", "unknown", 7) = -455870136
sigfillset(~<1,3,7-8,12,15,18,20,23-24,28,31,36,39,43,47-48,52,55-63>) = 230428768
getpagesize() = 6
meminfo(0, 0x100182d0, 0, 0) = 0
getpagesize( <unfinished ...>
__stack_chk_fail(0, 0x100182d0, 0, 0 <no return ...>
--- SIGSEGV (Segmentation fault) ---
strncpy(0, "Signa", 5) = 0x10017da8
dlerror() = "SEGV"
strcmp("\206 \255\373", "\001\002\003\004\005\006\a\b\t\n\v\f\r\016\017\020\021\022\023\024\025\026\027\030\031\032\033\034\035\036\037 "...Signal 11 (SEGV) caught by ps (procps-ng version 3.3.10).
) = 58
readtask(0, 0, 0x10017de8, 66ps:display.c:66: please report this bug
) = 0
__snprintf_chk(11, 0, 0x3fff81c5175b, 0) = 0x10003e90
time(0x10003e90) = 30039
fork() = 0
unexpected breakpoint at 0x3fff81b339a4
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++
root at lep8d:~#
== Comment: #7 - Thierry Fauck <thierry.fauck at fr.ibm.com> - 2016-02-17 14:11:52 ==
The problem is related to procps-ng 3.3.10
Upgrade to procps-ng 3.3.11 solves the issue
Going to Mirror and ask Canonical to advise.
== Comment: #9 - Thierry Fauck <thierry.fauck at fr.ibm.com> - 2016-02-17 14:13:10 ==
This bugs is linked to procps-ng 3.3.10 known as having some issues. Is upgrade to 3.3.11 an option ?
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ltrace/+bug/1547152/+subscriptions
More information about the foundations-bugs
mailing list