GNU bug report logs - #55832
28.1; Emacs crashes when using tramp from helm in emacs-29

Previous Next

Package: emacs;

Reported by: Thierry Volpiatto <thievol <at> posteo.net>

Date: Tue, 7 Jun 2022 15:24:02 UTC

Severity: normal

Found in version 28.1

Fixed in version 29.1

Done: Michael Albinus <michael.albinus <at> gmx.de>

Bug is archived. No further changes may be made.

Full log


View this message in rfc822 format

From: Eli Zaretskii <eliz <at> gnu.org>
To: Thierry Volpiatto <thievol <at> posteo.net>
Cc: 55832 <at> debbugs.gnu.org
Subject: bug#55832: 28.1; Emacs crashes when using tramp from helm in emacs-29
Date: Wed, 08 Jun 2022 19:30:12 +0300
> From: Thierry Volpiatto <thievol <at> posteo.net>
> Cc: 55832 <at> debbugs.gnu.org
> Date: Tue, 07 Jun 2022 19:20:39 +0000
> 
> Thread 1 "emacs" received signal SIGSEGV, Segmentation fault.
> 0x0000555555837be7 in doprnt (buffer=0x7fffff6702c0 "", bufsize=4000, format=0x5555558af29a "Bytecode stack overflow", ap=0x7fffff670250, format_end=<optimized out>) at doprnt.c:186
> 186     doprnt (char *buffer, ptrdiff_t bufsize, const char *format,
> (gdb) thread 1
> [Switching to thread 1 (Thread 0x7ffff07ce3c0 (LWP 226687))]
> #0  0x0000555555837be7 in doprnt (buffer=0x7fffff6702c0 "", bufsize=4000, format=0x5555558af29a "Bytecode stack overflow", ap=0x7fffff670250, format_end=<optimized out>) at doprnt.c:186
> 186     doprnt (char *buffer, ptrdiff_t bufsize, const char *format,
> (gdb) bt -full 5
> #0  0x0000555555837be7 in doprnt (buffer=0x7fffff6702c0 "", bufsize=4000, format=0x5555558af29a "Bytecode stack overflow", ap=0x7fffff670250, format_end=<optimized out>) at doprnt.c:186
>         fmt = <optimized out>
>         bufptr = <optimized out>
>         tembuf = '\000' <repeats 407 times>
>         size_allocated = <optimized out>
>         sprintf_buffer = <optimized out>
>         big_buffer = <optimized out>
>         quoting_style = <optimized out>
> #1  0x0000555555838a57 in doprnt (ap=0x7fffff670250, format_end=0x0, format=0x5555558af29a "Bytecode stack overflow", bufsize=<optimized out>, buffer=<optimized out>) at doprnt.c:590
>         modifier_len = "\000\001\001\001\001"
>         nbytes = <optimized out>
>         ap_copy = {{gp_offset = 8, fp_offset = 48, overflow_arg_area = 0x7fffff671380, reg_save_area = 0x7fffff6712c0}}
> #2  evxprintf
>     (buf=buf <at> entry=0x7fffff6702b8, bufsize=bufsize <at> entry=0x7fffff6702b0, nonheapbuf=nonheapbuf <at> entry=0x7fffff6702c0 "", bufsize_max=bufsize_max <at> entry=2305843009213693952, format=0x5555558af29a "Bytecode stack overflow", ap=ap <at> entry=0x7fffff6712a0) at doprnt.c:590
>         nbytes = <optimized out>
>         ap_copy = {{gp_offset = 8, fp_offset = 48, overflow_arg_area = 0x7fffff671380, reg_save_area = 0x7fffff6712c0}}

Sounds like C stack overflow trying to print a too-long variable-arg
list?  Why else would a program segfault when calling a function?




This bug report was last modified 2 years and 332 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.