From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21811 invoked from network); 9 Jan 2008 20:57:46 -0000 X-Spam-Checker-Version: SpamAssassin 3.2.3 (2007-08-08) on f.primenet.com.au X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.2.3 Received: from news.dotsrc.org (HELO a.mx.sunsite.dk) (130.225.247.88) by ns1.primenet.com.au with SMTP; 9 Jan 2008 20:57:46 -0000 Received-SPF: none (ns1.primenet.com.au: domain at sunsite.dk does not designate permitted sender hosts) Received: (qmail 14034 invoked from network); 9 Jan 2008 20:57:42 -0000 Received: from sunsite.dk (130.225.247.90) by a.mx.sunsite.dk with SMTP; 9 Jan 2008 20:57:42 -0000 Received: (qmail 3070 invoked by alias); 9 Jan 2008 20:57:40 -0000 Mailing-List: contact zsh-workers-help@sunsite.dk; run by ezmlm Precedence: bulk X-No-Archive: yes X-Seq: 24382 Received: (qmail 3051 invoked from network); 9 Jan 2008 20:57:39 -0000 Received: from bifrost.dotsrc.org (130.225.254.106) by sunsite.dk with SMTP; 9 Jan 2008 20:57:39 -0000 Received: from virusfilter.dotsrc.org (bifrost [127.0.0.1]) by spamfilter.dotsrc.org (Postfix) with ESMTP id 00DE18058FF2 for ; Wed, 9 Jan 2008 21:57:37 +0100 (CET) Received: from acolyte.scowler.net (acolyte.scowler.net [216.254.112.45]) by bifrost.dotsrc.org (Postfix) with ESMTP for ; Wed, 9 Jan 2008 21:57:36 +0100 (CET) Received: by acolyte.scowler.net (Postfix, from userid 1000) id 83D395D19B; Wed, 9 Jan 2008 15:57:32 -0500 (EST) Date: Wed, 9 Jan 2008 15:57:32 -0500 From: Clint Adams To: Peter Stephenson Cc: zsh-workers@sunsite.dk, 459896-submitter@bugs.debian.org Subject: Re: Bug#459896: Segfaults in "apt-c(" completion Message-ID: <20080109205732.GA7844@scowler.net> Mail-Followup-To: Peter Stephenson , zsh-workers@sunsite.dk, 459896-submitter@bugs.debian.org References: <20080109122004.GA20014@bee.dooz.org> <20080109145147.GA24262@scowler.net> <200801091735.m09HZUf8007116@news01.csr.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200801091735.m09HZUf8007116@news01.csr.com> User-Agent: Mutt/1.5.17 (2007-11-01) X-Virus-Scanned: ClamAV using ClamSMTP On Wed, Jan 09, 2008 at 05:35:30PM +0000, Peter Stephenson wrote: > Doesn't happen here, but in any case I suspect this is some quite basic > problem since the "(" forces the shell to complete all possible commands > after it. So it's simply searching the entire set of tables for things > that can occur in command position. It's probably some memory > allocation thing. More info from valgrind: ==7792== Invalid read of size 4 ==7792== at 0x80A1D23: pattryrefs (pattern.c:1873) ==7792== by 0x80A25C7: pattry (pattern.c:1824) ==7792== by 0x8097353: scanparamvals (params.c:517) ==7792== by 0x47D3CC5: scanpmcommands (parameter.c:265) ==7792== by 0x8074AE1: scanmatchtable (hashtable.c:381) ==7792== by 0x8074B3B: scanhashtable (hashtable.c:444) ==7792== by 0x80949C9: paramvalarr (params.c:551) ==7792== by 0x8094A5D: getvaluearr (params.c:569) ==7792== by 0x80955AA: getarg (params.c:1305) ==7792== by 0x8096601: getindex (params.c:1591) ==7792== by 0x80977CF: fetchvalue (params.c:1808) ==7792== by 0x80AB2E3: stringsubst (subst.c:1912) ==7792== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==7792== ==7792== Process terminating with default action of signal 11 (SIGSEGV) ==7792== Access not within mapped region at address 0x0 ==7792== at 0x80A1D23: pattryrefs (pattern.c:1873) ==7792== by 0x80A25C7: pattry (pattern.c:1824) ==7792== by 0x8097353: scanparamvals (params.c:517) ==7792== by 0x47D3CC5: scanpmcommands (parameter.c:265) ==7792== by 0x8074AE1: scanmatchtable (hashtable.c:381) ==7792== by 0x8074B3B: scanhashtable (hashtable.c:444) ==7792== by 0x80949C9: paramvalarr (params.c:551) ==7792== by 0x8094A5D: getvaluearr (params.c:569) ==7792== by 0x80955AA: getarg (params.c:1305) ==7792== by 0x8096601: getindex (params.c:1591) ==7792== by 0x80977CF: fetchvalue (params.c:1808) ==7792== by 0x80AB2E3: stringsubst (subst.c:1912) ==7792== ==7792== ERROR SUMMARY: 11 errors from 7 contexts (suppressed: 75 from 1) ==7792== malloc/free: in use at exit: 943,011 bytes in 29,311 blocks. ==7792== malloc/free: 40,321 allocs, 11,010 frees, 3,810,434 bytes allocated. ==7792== For counts of detected errors, rerun with: -v ==7792== searching for pointers to 29,311 not-freed blocks. ==7792== checked 1,294,940 bytes. ==7792== ==7792== LEAK SUMMARY: ==7792== definitely lost: 312 bytes in 22 blocks. ==7792== possibly lost: 0 bytes in 0 blocks. ==7792== still reachable: 942,699 bytes in 29,289 blocks. ==7792== suppressed: 0 bytes in 0 blocks. ==7792== Rerun with --leak-check=full to see details of leaked memory.