<div dir="ltr">The MySQL analyzer is ready to go, apart from one issue: a memleak btest that I wrote is failing on some of Bro's regex code.<br><br>> # @TEST-EXEC: HEAP_CHECK_DUMP_DIRECTORY=. HEAPCHECK=local btest-bg-run bro bro -b -m -r $TRACES/mysql/mysql.trace %INPUT<br>> <br>> @load base/protocols/mysql<br><br>This results in:<div><br>> Leak check net_run detected leaks of 203 bytes in 4 objects</div><div>> <br>> The 4 largest leaks:<br>> Leak of 72 bytes in 1 objects allocated from:<br>> @ 53e92d<br>> <br>> Leak of 56 bytes in 1 objects allocated from:<br>> @ 52fb66<br>> @ 83f663<br>> <br>> Leak of 56 bytes in 1 objects allocated from:<br>> @ 52fd52<br>> @ 20014<br>> <br>> Leak of 19 bytes in 1 objects allocated from:<br>> @ 53e9b6<br> <br>Digging a little deeper shows that two of these leaks are in RE_parse (re-parse.y:110 and re-parse.y:133), one is in re__scan_buffer (re-scan.cc:2035), and one is in re__scan_bytes (re-scan.cc::2084).</div><div><br></div><div>The only regular expression that I have in the analyzer is: type NUL_String = <span class="">RE</span>/[^\0]*/;</div><div><br></div><div>I'm pretty sure that this isn't really an issue, but can anyone help with figuring out how to get the btest to pass? I'd really like to have a memleak test for this.</div><div><br></div><div>Thanks,</div><div><br></div><div> --Vlad</div>
</div>