From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from primenet.com.au (ns1.primenet.com.au [203.24.36.2]) by inbox.vuxu.org (OpenSMTPD) with ESMTP id 0e41657c for ; Mon, 11 Nov 2019 14:59:03 +0000 (UTC) Received: (qmail 21589 invoked by alias); 11 Nov 2019 14:58:58 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 44906 Received: (qmail 22403 invoked by uid 1010); 11 Nov 2019 14:58:58 -0000 X-Qmail-Scanner-Diagnostics: from mailout2.w1.samsung.com by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.0/25628. spamassassin: 3.4.2. Clear:RC:0(210.118.77.12):SA:0(-7.0/5.0):. Processed in 4.204937 secs); 11 Nov 2019 14:58:58 -0000 X-Envelope-From: p.stephenson@samsung.com X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at _spf.samsung.com designates 210.118.77.12 as permitted sender) DKIM-Filter: OpenDKIM Filter v2.11.0 mailout2.w1.samsung.com 20191111145814euoutp02095dbe1f5559321319fe474fc754a6fe~WI6ESdvB50775407754euoutp02u DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=samsung.com; s=mail20170921; t=1573484294; bh=JN/XreZ+JaluFaacunlj9kYglgVfny8AqbLhUkoH7Wo=; h=Subject:From:To:Date:In-Reply-To:References:From; b=JjkF833ewzD+Zbs76QDApsEcJR+4RLRYgMD7OTNeMU+YUjil/s59sSPLwHTq8C8Ep olEXQSLnJJFeVzR5p5zsF4ve42DO4Q05KfMZpErl3LZRPbP5OISc/f0j9Saaxn5aoZ 6HGMaSh5IbgcV/4f54EaUQXxQAVPF63yYJafRzT4= X-AuditID: cbfec7f2-569ff70000001175-4c-5dc977066f04 Message-ID: <1573484293.4561.8.camel@samsung.com> Subject: Re: [BUG] Crash when accessing WIDGETSTYLE from SIGINT trap From: Peter Stephenson To: Roman Perepelitsa , Zsh hackers list Date: Mon, 11 Nov 2019 14:58:13 +0000 In-Reply-To: X-Mailer: Evolution 3.18.5.2-0ubuntu3.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrFIsWRmVeSWpSXmKPExsWy7djPc7ps5SdjDRbvFrOY9P4Fo8XB5odM DkweO2fdZfdYdfADUwBTFJdNSmpOZllqkb5dAlfG0W8/2Au+MVZ87z/K2sB4mLGLkZNDQsBE 4tC0FUA2F4eQwApGiab2bcwQzhdGiW9bZ7NAOJ8ZJT5O72eCafmyaiFUYjmjRMPrDia4qpOf /kANO8Mo0XPvIpRzgVHi4altYP28AoYSszvXg60XFnCR+Pn1JDuIzQYUn7ppNlhcRCBW4tXK p2BxFgFVieOvPrOC2JwCgRJbDmxlg7hDQ2LDzWNQMwUlTs58wgJiMwvISzRvnQ32hYTAazaJ aZf/s0A0uEhMmX0F6glhiVfHt7BD2DISpyf3sEA0tDNKrJn0mh3C6WGU2HT0DjSkrCX6boP8 wwG0QlNi/S59iLCjxNXvu1hBwhICfBI33gpCHMEnMWnbdGaIMK9ER5sQRLWaxI6mrYwQYRmJ p2sUJjAqzULywSwkH8xCWLWAkXkVo3hqaXFuemqxYV5quV5xYm5xaV66XnJ+7iZGYIo4/e/4 px2MXy8lHWIU4GBU4uFlSDgZK8SaWFZcmXuIUYKDWUmEd0fFiVgh3pTEyqrUovz4otKc1OJD jNIcLErivNUMD6KFBNITS1KzU1MLUotgskwcnFINjJvNPJh65rvdEby/VKx84w+XqG2cX38u eSrQZpKRLKmzJquKPZLz8X22RL4Hrdn/NRncfvHMychRkOxi8XOfYnyiXXzp8wluviu3uN96 Exhh8fF9I+/PrfOtp4a8m9X17Od936D9KSrHD7VHXU49t+71nP5z068/87t2/ybf5Z9H53M9 WsDLGajEUpyRaKjFXFScCADLAQNJDQMAAA== X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupmkeLIzCtJLcpLzFFi42I5/e/4XV228pOxBqeWsVhMev+C0eJg80Mm ByaPnbPusnusOviBKYApSs+mKL+0JFUhI7+4xFYp2tDCSM/Q0kLPyMRSz9DYPNbKyFRJ384m JTUnsyy1SN8uQS/j6Lcf7AXfGCu+9x9lbWA8zNjFyMkhIWAi8WXVQpYuRi4OIYGljBJT3m9i h0jISHy68hHKFpb4c62LDcQWEvjIKPHvsiWEfYZRovOfBkTzBUaJqzO3sYAkeAUMJWZ3rgfb ICzgIvHz60mwQWxA8ambZoPFRQRiJV6tfAoWZxFQlTj+6jMriM0pECix5cBWNriLjs98DVbE LKAp0br9N9RFGhIbbh5jglgmKHFy5hMWiBp5ieats5knMArNQtIyC0nZLCRlCxiZVzGKpJYW 56bnFhvqFSfmFpfmpesl5+duYgRGxLZjPzfvYLy0MfgQowAHoxIPL0PCyVgh1sSy4srcQ4wS HMxKIrw7Kk7ECvGmJFZWpRblxxeV5qQWH2I0BfpoIrOUaHI+MFrzSuINTQ3NLSwNzY3Njc0s lMR5OwQOxggJpCeWpGanphakFsH0MXFwSjUwJh9aViV64OPFqX92HjeaoGzmHbzg2I2jMmJr AphyWtvCkpneGPgGbuxaYXStMKWywKLo524WFTvxDc3a/Gtzuvh22gucMl70ImthXszSB3OM Y9kWnG+3fdt6eEd80UqjxnzWiZu+vw7tPLpzfzsPk0Zv+P8rv5Wrbgr8mjPr6LXrF2515UT1 KbEUZyQaajEXFScCADSAxwqeAgAA X-CMS-MailID: 20191111145814eucas1p16609de645a846eacb8f535dd581fbf71 X-Msg-Generator: CA Content-Type: text/plain; charset="utf-8" X-RootMTR: 20191111143952eucas1p2784d9821f292f2c9c136b19da5a56ade X-EPHeader: CA CMS-TYPE: 201P X-CMS-RootMailID: 20191111143952eucas1p2784d9821f292f2c9c136b19da5a56ade References: On Mon, 2019-11-11 at 15:38 +0100, Roman Perepelitsa wrote: > Crash at zle_params.c:436 due to bindk being null: >  >     Widget widget = bindk->widget; Looks to me like returning the empty string in that case would be fine? pws