Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
PATCH: memory leak in anonoymous functions
- X-seq: zsh-workers 28469
- From: Peter Stephenson <p.w.stephenson@xxxxxxxxxxxx>
- To: zsh-workers@xxxxxxx (Zsh hackers list)
- Subject: PATCH: memory leak in anonoymous functions
- Date: Fri, 03 Dec 2010 23:20:08 +0000
- List-help: <mailto:zsh-workers-help@zsh.org>
- List-id: Zsh Workers List <zsh-workers.zsh.org>
- List-post: <mailto:zsh-workers@zsh.org>
- Mailing-list: contact zsh-workers-help@xxxxxxx; run by ezmlm
Found by valgrind. It's reporting lots of possible leaks, but they're
very hard to track down. For example,
save = (!(state->prog->flags & EF_HEAP) &&
!strcmp(opat, right) && pprog != dummy_patprog2);
if (!(pprog = patcompile(right, (save ? PAT_ZDUP : PAT_STATIC),
NULL))) {
zwarnnam(fromtest, "bad pattern: %s", right);
return 2;
}
else if (save)
state->prog->pats[npat] = pprog;
That pprog might be leaked, it says. Er, yeah, right.
It's also very suspicious of parameters, particularly complicated uses
like tied parameters and autoloaded parameters.
Index: Src/exec.c
===================================================================
RCS file: /cvsroot/zsh/zsh/Src/exec.c,v
retrieving revision 1.185
diff -p -u -r1.185 exec.c
--- Src/exec.c 27 Nov 2010 19:46:32 -0000 1.185
+++ Src/exec.c 3 Dec 2010 23:14:32 -0000
@@ -4159,6 +4159,10 @@ execfuncdef(Estate state, UNUSED(int do_
execshfunc(shf, args);
ret = lastval;
+
+ freeeprog(shf->funcdef);
+ zsfree(shf->filename);
+ zfree(shf, sizeof(*shf));
break;
} else {
/* is this shell function a signal trap? */
--
Peter Stephenson <p.w.stephenson@xxxxxxxxxxxx>
Web page now at http://homepage.ntlworld.com/p.w.stephenson/
Messages sorted by:
Reverse Date,
Date,
Thread,
Author