On Wednesday, July 8, 2015 at 4:05:20 PM UTC-7, Scott Bell wrote:
> On Wednesday, July 8, 2015 at 3:48:22 PM UTC-7, neil wrote:
> > Does adding the executable pathname to the `gdb` command line (i.e., 
> > format `gdb EXECUTABLE-FILE CORE-FILE`) give you the symbols?
> 
> Ah, of course. Yes, now we're getting somewhere:
> 
> ...
>     #6  0x000000080153e004 in strlen () from /lib/libc.so.7
>     #7  0x0000000800a72bf3 in scheme_make_byte_string_without_copying ()
>        from /usr/local/lib/libracket3m-6.1.1.so
>     #8  0x0000000800ade3f2 in c_to_scheme ()
>        from /usr/local/lib/libracket3m-6.1.1.so
>     #9  0x0000000800adee02 in ffi_do_call ()
>        from /usr/local/lib/libracket3m-6.1.1.so
> ...
> 
> That certainly points me in the direction of a bad FFI call.

When I say bad FFI call, I'm leaving open the possibility that
the issue may be in the FFI machinery as well as in our source,
but I should point out that the minimal amount of FFI code 
that we have is years old and has been running without issue.
We first observed this crash only a few months ago. 

-- 
You received this message because you are subscribed to the Google Groups 
"Racket Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to