[Jonny]
> $ valgrind -v --leak-check=full --show-reachable=yes insserv

Thank you.

> ==554== Invalid read of size 1
> ==554==    at 0x402377E: strcmp (mc_replace_strmem.c:337)
> ==554==    by 0x80513BA: (within /sbin/insserv)
> ==554==    by 0x804D5FE: (within /sbin/insserv)
> ==554==    by 0x4046454: (below main) (in /lib/i686/cmov/libc-2.7.so)
> ==554==  Address 0x0 is not stack'd, malloc'd or (recently) free'd

strcmp() on a NULL pointer, it seem.  Can you try again after building
a non-stripped version of insserv, ie for example as root:

  apt-get build-dep insserv
  DEB_BUILD_OPTIONS=nostrip apt-get source -b insserv
  dpkg -i insserv*.deb

There are a lot of calls to strcmp() in insserv, and without knowing
which call got the NULL pointer argument, it is hard to know where to
look for the bug.

Do you have any idea how I can reproduce this issue?  I suspect your
content of /etc/init.d/ somehow trigger it.

Happy hacking,
-- 
Petter Reinholdtsen



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to