From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 4113 invoked from network); 8 Mar 2001 05:43:17 -0000 Received: from sunsite.dk (130.225.51.30) by ns1.primenet.com.au with SMTP; 8 Mar 2001 05:43:17 -0000 Received: (qmail 20290 invoked by alias); 8 Mar 2001 05:42:52 -0000 Mailing-List: contact zsh-workers-help@sunsite.dk; run by ezmlm Precedence: bulk X-No-Archive: yes X-Seq: 13590 Received: (qmail 20279 invoked from network); 8 Mar 2001 05:42:51 -0000 Message-ID: <20010308054248.66006.qmail@web10407.mail.yahoo.com> Date: Wed, 7 Mar 2001 21:42:48 -0800 (PST) From: Felix Rosencrantz Subject: PATCH: Re: Bug w/matching control To: zsh-workers MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="0-1667012800-984030168=:64711" --0-1667012800-984030168=:64711 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Here's the patch I mentioned before. I use to have access to purify, which does a great job at memory leak detection and many other memory related problems. I no longer have access to purify. Maybe someone who does could, run zsh through purify for with the tests. I would also use an instrumented version as I worked during the day. Is there good freely available memory leak detection package that works on linux? -FR __________________________________________________ Do You Yahoo!? Get email at your own domain with Yahoo! Mail. http://personal.mail.yahoo.com/ --0-1667012800-984030168=:64711 Content-Type: text/plain; name="comppatch.txt" Content-Description: comppatch.txt Content-Disposition: inline; filename="comppatch.txt" Index: 54compmatch.ztst =================================================================== RCS file: /cvsroot/zsh/zsh/Test/54compmatch.ztst,v retrieving revision 1.10 diff -r1.10 54compmatch.ztst 623a624,630 > test_code $workers_13320_matcher workers_13320_list > comptest $'tst g-2\t' > 0:Test from workers 13563 > >line: {tst glibc}{-2.1.94-3.i386.rpm} > >COMPADD:{} > >INSERT_POSITIONS:{9:27} > --0-1667012800-984030168=:64711--