From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 11687 invoked from network); 15 Jan 1999 02:20:39 -0000 Received: from math.gatech.edu (list@130.207.146.50) by ns1.primenet.com.au with SMTP; 15 Jan 1999 02:20:39 -0000 Received: (from list@localhost) by math.gatech.edu (8.9.1/8.9.1) id VAA20921; Thu, 14 Jan 1999 21:18:04 -0500 (EST) Resent-Date: Thu, 14 Jan 1999 21:18:04 -0500 (EST) Date: Thu, 14 Jan 1999 20:17:36 -0600 (CST) From: "Daniel X. Pape" To: zsh-workers@math.gatech.edu Subject: Question: patch for memory leak Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Resent-Message-ID: <"It6k91.0.q65.SLgds"@math> Resent-From: zsh-workers@math.gatech.edu X-Mailing-List: archive/latest/4906 X-Loop: zsh-workers@math.gatech.edu Precedence: list Resent-Sender: zsh-workers-request@math.gatech.edu Hi - I recently downloaded and compiled zsh-3.1.5-pws-4. However, I found a couple of memory leaks in builtin.c where the result of a ztrdup was being used as an argument, and not freed, and also where the result of a "promptexpand" was being passed to "unmetafy," and then that result was never freed. After fixing the problem and re-compiling, I have been using the resulting executable for two days now, and have seen no problems. Is there any kind of test suite to use before submitting a patch? or should I just go ahead and send it? Thanks - Dan