On 12/20/19 3:43 PM, Chet Ramey wrote:
> On 12/19/19 2:00 PM, Kirill Chibisov wrote:
>> I was able to capture the stack trace under gdb. However you should
>> probably use the following command in it to repro the issue.
>>
>> `set disable-randomization off`
>>
>> The issue happens quite randomly, however the important thing is exit code
>> from bash (139). So there's something with memory access, I guess.
>>
>> (gdb) info stack
>> #0  0x00007fe30e6955ba in _rl_col_width (flags=<optimized out>,
>> end=1735628519, start=<optimized out>, str=0x557e988c691a "/こんにち")
>>      at
>> /usr/src/debug/sys-libs/readline-8.0_p1-r1/readline-8.0/display.c:3206
>> #1  _rl_col_width (str=0x557e988c691a "/こんにち", start=<optimized out>,
>> end=1735628519, flags=<optimized out>)
> 
> Well, the values for `end' are obviously suspicious, but you can't really
> tell too much from this traceback, especially since other values of
> interest are optimized out. The value of `end' is computed in the caller,
> from `oe - old'. Since those are pointers into the same string, the value
> shouldn't be that far out of whack. The values of `old' and `new' are
> helpful, though. I'll see if I can find it.

I found it.


-- 
``The lyf so short, the craft so long to lerne.'' - Chaucer
                 ``Ars longa, vita brevis'' - Hippocrates
Chet Ramey, UTech, CWRU    c...@case.edu    http://tiswww.cwru.edu/~chet/

Reply via email to