Comment 4 for bug 1053616

Paul Menzel (pm-debian) wrote :

Thanks to installing debugging symbols with the patch attached to <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687213>, I was able to get a backtrace by analyzing the core dump file with GDB. Unfortunately it is hard to analyze that generated C code. :(

 Core was generated by `simple-scan -d'.
 Program terminated with signal 11, Segmentation fault.
 #0 page_parse_line (size_changed=<synthetic pointer>, n=0, line=0x1f98380, self=0x1f6f8e0) at page.c:569
 569 _tmp24_[_tmp25_ + _tmp26_] = _tmp31_;
 (gdb) l
 564 _tmp28_ = _tmp27_->data;
 565 _tmp28__length1 = _tmp27_->data_length1;
 566 _tmp29_ = line_offset;
 567 _tmp30_ = i;
 568 _tmp31_ = _tmp28_[_tmp29_ + _tmp30_];
 569 _tmp24_[_tmp25_ + _tmp26_] = _tmp31_;
 570 _tmp32_ = _tmp24_[_tmp25_ + _tmp26_];
 571 }
 572 }
 573 }
 (gdb) p* _tmp24_
 value has been optimized out
 (gdb) p* size_changed
 $1 = 0
 (gdb) info regs
 Undefined info command: "regs". Try "help info".
 (gdb) info re
 record registers
 (gdb) info registers
 rax 0x0 0
 rbx 0x0 0
 rcx 0x70 112
 rdx 0x0 0
 rsi 0x0 0
 rdi 0x0 0
 rbp 0x1f6f8e0 0x1f6f8e0
 rsp 0x7fffae471990 0x7fffae471990
 r8 0x7fffae471b60 140736117283680
 r9 0x0 0
 r10 0x7fffae471bd8 140736117283800
 r11 0x7f20ebb5f9c6 139779370252742
 r12 0x1f98380 33129344
 r13 0x355 853
 r14 0x0 0
 r15 0x7fffae471b60 140736117283680
 rip 0x414793 0x414793 <page_parse_scan_line+275>
 eflags 0x10246 [ PF ZF IF RF ]
 cs 0x33 51
 ss 0x2b 43
 ds 0x0 0
 es 0x0 0
 fs 0x0 0
 gs 0x0 0
 (gdb) p line_offset
 $2 = 0
 (gdb) p* line_offset
 Cannot access memory at address 0x0