Bug#1012150: gummi: Gummi segfaults
Martin Dosch
martin at mdosch.de
Wed Jun 22 18:27:17 BST 2022
Dear Bernhard,
I'm sending an backtrace. BTW, I compiled 0.8.3 from upstream which
doesn't segfault.
Thread 1 "gummi" received signal SIGSEGV, Segmentation fault.
__strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:74
74 ../sysdeps/x86_64/multiarch/strlen-avx2.S: Datei oder Verzeichnis nicht gefunden.
(gdb) bt full
#0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:74
#1 0x00007ffff6e97618 in __vfprintf_internal (s=s at entry=0x7fffffffbd50, format=format at entry=0x55555557feb0 "Typesetter detected: Latexmk %s\n", ap=ap at entry=0x7fffffffbed8, mode_flags=mode_flags at entry=2) at vfprintf-internal.c:1647
len = <optimized out>
step0_jumps = {0, 1717, 1621, 3413, 3317, 3997, 2677, 2837, 3613, 1773, 4309, 4445, 3517, 4437, 4389, 2789, 4197, 3917, 3221, 2997, 1141, 1365, 1997, 1925, 1885, 733, 3709, 533, 533, 4101}
space = <optimized out>
is_short = <optimized out>
use_outdigits = 0
step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 1773, 4309, 4445, 3517, 4437, 4389, 2789, 4197, 3917, 3221, 2997, 1141, 1365, 1997, 1925, 1885, 733, 3709, 533, 533, 0}
group = 0
prec = -1
step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4309, 4445, 3517, 4437, 4389, 2789, 4197, 3917, 3221, 2997, 1141, 1365, 1997, 1925, 1885, 733, 3709, 533, 533, 0}
string = 0x71 <error: Cannot access memory at address 0x71>
left = 0
is_long_double = <optimized out>
width = 0
step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 4213, 0, 0, 0, 4389, 2789, 4197, 3917, 3221, 0, 0, 0, 0, 1925, 0, 0, 0, 0, 0, 0}
alt = <optimized out>
showsign = 0
is_long = 0
is_char = <optimized out>
pad = <optimized out>
step3b_jumps = {0 <repeats 11 times>, 3517, 0, 0, 4389, 2789, 4197, 3917, 3221, 2997, 1141, 1365, 1997, 1925, 1885, 733, 3709, 0, 0, 0}
step4_jumps = {0 <repeats 14 times>, 4389, 2789, 4197, 3917, 3221, 2997, 1141, 1365, 1997, 1925, 1885, 733, 3709, 0, 0, 0}
is_negative = <optimized out>
number = {longlong = <optimized out>, word = <optimized out>}
base = <optimized out>
the_arg =
{pa_wchar = 1431836786 L'\x55581872', pa_int = 1431836786, pa_long_int = 93824992417906, pa_long_long_int = 93824992417906, pa_u_int = 1431836786, pa_u_long_int = 93824992417906, pa_u_long_long_int = 93824992417906, pa_double = 4.6355705475002788e-310, pa_long_double = 3.42010818440627680093e-4937, pa_float128 = 2.09007770570737752066673455613767745e-4939, pa_string = 0x555555581872 "%s", pa_wstring = 0x555555581872 L"\x72007325\x5f6c6165\x656d6974\x6f6f7a00\x6f6d5f6d\x61006564\x7961776c\x656e0073\x726576\x74746573\x20676e69\x746e6f66\x206f7420\xa7325\x70657473\x6f630073\x6c69706d\x63732065\x656d6568\x74657320\x206f7420\xa7325", pa_pointer = 0x555555581872, pa_user = 0x555555581872}
spec = 115 's'
_buffer = {__routine = 0x2, __arg = 0x8000000000000006, __canceltype = 0, __prev = 0x0}
_avail = <optimized out>
thousands_sep = 0x0
grouping = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>
done = 29
f = 0x55555557fece "s\n"
lead_str_end = 0x55555557fecd "%s\n"
end_of_spec = <optimized out>
work_buffer = "\000\000\000\000\377\177\000\000 \337\377\377\377\177\000\000\002\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000&\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\265i\000\000\000\000\000\000\375]\357\366\377\177\000\000\302\003\000\000\000\000\000\000\240\223uUUU\000\000\234\271\377\377\377\177\000\000\070\061\213UUU\000\000\000\000\000\000\000\000\000\000\220\254\342\333\377\177\000\000\246\254\342\333\377\177\000\000\220\254\342\333\000\000\000\000D\002\000\000-\000\000\000a\221\001\367\377\177\000\000X\272\377\377\377\177\000\000\000\000\000\000\000\000\000\000\220\274\377\377\377\177\000\000\b", '\000' <repeats 15 times>...
workend = 0x7fffffffbcf8 ""
ap_save = {{gp_offset = 16, fp_offset = 48, overflow_arg_area = 0x7fffffffdfe0, reg_save_area = 0x7fffffffdf00}}
nspecs_done = 0
save_errno = 2
readonly_format = 0
#2 0x00007ffff6ea8176 in __vsnprintf_internal (string=string at entry=0x7fffffffbef0 "Typesetter detected: Latexmk \177", maxlen=<optimized out>,
maxlen at entry=8192, format=format at entry=0x55555557feb0 "Typesetter detected: Latexmk %s\n", args=args at entry=0x7fffffffbed8, mode_flags=mode_flags at entry=2) at vsnprintf.c:114
sf =
{f = {_sbf = {_f = {_flags = -72515583, _IO_read_ptr = 0x7fffffffbef0 "Typesetter detected: Latexmk \177", _IO_read_end = 0x7fffffffbef0 "Typesetter detected: Latexmk \177", _IO_read_base = 0x7fffffffbef0 "Typesetter detected: Latexmk \177", _IO_write_base = 0x7fffffffbef0 "Typesetter detected: Latexmk \177", _IO_write_ptr = 0x7fffffffbf0d "\177", _IO_write_end = 0x7fffffffdeef "", _IO_buf_base = 0x7fffffffbef0 "Typesetter detected: Latexmk \177", _IO_buf_end = 0x7fffffffdeef "", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0, _markers = 0x0, _chain = 0x0, _fileno = 0, _flags2 = 128, _old_offset = 93824992411312, _cur_column = 0, _vtable_offset = -87 '\251', _shortbuf--Type <R--Type <RET> for more, q to quit, c to continue without paging--
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/debian-science-maintainers/attachments/20220622/b08eab88/attachment.sig>
More information about the debian-science-maintainers
mailing list