ltrace 0.7.3-5.1ubuntu4 source package in Ubuntu

Changelog

ltrace (0.7.3-5.1ubuntu4) xenial; urgency=medium

  * debian/patches/LP1547152.diff: removed.
  * Backport more ppc64el fixes to fix tracing on PPC64; backporting the
    required bits and pieces from the rest of ltrace (LP: #1547152, #1398143)
    - add_irelative_tracing_b420a226.patch: add support for IRELATIVE tracing.
    - find_irelative_b061bae3.patch: split the function
      linux_elf_find_irelative_name out of linux_elf_add_plt_entry_irelative
    - keep_plt_reloc_in_vector_673ff510.patch: keep PLT relocs in a vector.
    - add_elf_each_symbol_7a29f9e7.patch: add elf_each_symbol function for
      iteration.
    - add_elf_can_read_next_5c37171a.patch: add the elf_can_read_next method.
    - add_elf_read_next_u_439ab5bf.patch: add methods for doing stream-like
      reads for various types.
    - add_elf_read_u8_3c636fb7.patch: add read for u8.
    - elf_read_uleb128_184779e4.patch: add elf_read_*_uleb128.
    - elf_load_dynamic_entry_4f2f66e6.patch: add function load_dynamic_entry.
    - arm_attr_decoding_df7d2311.patch: implement ARM attribute decoding,
      this can determine when hardfp is used in the process.
    - arm_fetch_backend_97a25160.patch: add fetch backend for float and double
      return values on ARM.
    - arm_backend_fixes_1383e5bd.patch: misc ARM backend fixes.
    - arm_bpc_62fc7747.patch: implement Base Procedure Call Standard.
    - arm_vfp_params_1c8596d4.patch: implement VFP parameter passing for ARM.
    - arm_vararg_without_vfp_88a0fe50.patch: we need to handle varargs in ARM
      without VFP.
    - arm_plt_rel_9e33f5ac.patch: unbreak ARM wrt the previous patch, relplt
      got removed from struct rtelf; so fix this to still work.
    - dont_ltelf_destroy_if_init_fails_0ba3c5ee.patch: don't call
      ltelf_destroy if ltelf_init fails (ie. for ENOENT).
    - ppc64el.diff: backported eea4ad2c to replace the patch that was already
      there, as it includes support for irelative and wchar.
    - jmp_irel.patch: backport 73b85aad: support tracing P_PPC64_JMP_IREL.
    - ppc64le-fixes.patch: more misc backports for ppc64 fixes, patch from
      Fedora packaging git.
      + [35a9677d] fix bugs in fetch backend of powerpc64le
      + [a46c07fc] Fix coding style in PowerPC's arch.h
      + [44789e1e] PowerPC: convert ELFv2 conditionals from preprocessor to
        plain conditions.
    - ppc64-fork.patch: backport 35742523: Fix tracing across fork on PPC64.
    - on_install_breakpoint_56134ff5.patch: ensure we do have the on_install
      breakpoint needed for the unprelink patch.
    - ppc64-unprelink.patch: backport a0093ca4: Don't crash untraced calls via
      PLT in prelinked PPC64 binaries.
    - ppc-bias.patch: backport three commits for bias and unresolved breakports
      in PPC:
      + [bf821009] Fix address biasing in PPC backend
      + [d80c5371] Fix cloning of PPC_PLT_NEED_UNRESOLVE breakpoints
      + [d8f1287b] Nits

 -- Mathieu Trudel-Lapierre <email address hidden>  Wed, 06 Apr 2016 18:58:54 -0400

Upload details

Uploaded by:
Mathieu Trudel-Lapierre
Uploaded to:
Xenial
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
utils
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Xenial release main utils

Downloads

File Size SHA-256 Checksum
ltrace_0.7.3.orig.tar.bz2 471.3 KiB 0e6f8c077471b544c06def7192d983861ad2f8688dd5504beae62f0c5f5b9503
ltrace_0.7.3-5.1ubuntu4.debian.tar.xz 48.8 KiB 9e60e79c8868cf33f14692d299b804a8220ffebee5ecc2107bd9875f366e31fe
ltrace_0.7.3-5.1ubuntu4.dsc 1.8 KiB 501b620ef0a7d0281f3ed429fe14f65787157b5aab1ed9f8d9ec060c55eb9943

View changes file

Binary packages built by this source

ltrace: Tracks runtime library calls in dynamically linked programs

 ltrace is a debugging program which runs a specified command until it
 exits. While the command is executing, ltrace intercepts and records
 the dynamic library calls which are called by
 the executed process and the signals received by that process.
 It can also intercept and print the system calls executed by the program.
 .
 The program to be traced need not be recompiled for this, so you can
 use it on binaries for which you don't have the source handy.
 .
 You should install ltrace if you need a sysadmin tool for tracking the
 execution of processes.