Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 May 1998 12:16:52 -0400 (EDT)
From:      chet@po.cwru.edu
To:        FreeBSD-gnats-submit@FreeBSD.ORG
Subject:   gnu/6701: Patch for freebsd-current/src/contrib/libreadline/display.c
Message-ID:  <199805201616.MAA26059@nike.ins.cwru.edu>

next in thread | raw e-mail | index | archive | help

>Number:         6701
>Category:       gnu
>Synopsis:       patch for GNU readline library, version 2.2
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          open
>Quarter:
>Keywords:
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed May 20 09:20:01 PDT 1998
>Last-Modified:
>Originator:     Chet Ramey
>Organization:
Case Western Reserve University
>Release:        FreeBSD 2.2.5-RELEASE i386
>Environment:

	I don't run FreeBSD-current, but this patch is against
	current-src/src/contrib/libreadline/display.c (built in
	current-src/src/gnu/lib/libreadline).

>Description:

	Problem with readline line wrap when the prompt is longer than
	the screen width and contains invisible characters.

>How-To-Repeat:

>Fix:
	
	Here's the patch:

*** ../readline-2.2/display.c	Mon Aug  4 15:54:23 1997
--- display.c	Fri Apr 24 14:23:35 1998
***************
*** 424,428 ****
--- 424,435 ----
    while (lpos >= screenwidth)
      {
+ #if 0
        temp = ((newlines + 1) * screenwidth) - ((newlines == 0) ? wrap_offset : 0);
+ #else
+       /* XXX - possible fix from Darin Johnson <darin@acuson.com> for prompt
+ 	 string with invisible characters that is longer than the screen
+ 	 width. */
+       temp = ((newlines + 1) * screenwidth) + ((newlines == 0) ? wrap_offset : 0);
+ #endif
        inv_lbreaks[++newlines] = temp;
        lpos -= screenwidth;

>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199805201616.MAA26059>