Your message dated Mon, 05 Nov 2012 18:32:35 +0000
with message-id <[email protected]>
and subject line Bug#686976: fixed in cppcheck 1.57-1
has caused the Debian Bug report #686976,
regarding Internal error. Token::Match called with varid 0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
686976: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686976
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cppcheck
Version: 1.56-1
Hello, I was trying out the latest version of cppcheck (1.56-1) when I noticed
two source files in Widelands triggered the following error message:
$ cppcheck widelands/src/editor/ui_menus/editor_main_menu_new_map.cc
Checking widelands/src/editor/ui_menus/editor_main_menu_new_map.cc...
[widelands/src/editor/ui_menus/editor_main_menu_new_map.cc] ->
[widelands/src/editor/ui_menus/editor_main_menu_new_map.cc:61]: (error)
Internal error. Token::Match called with varid 0. Please report this to
Cppcheck developers
$ cppcheck widelands/src/editor/ui_menus/editor_main_menu_random_map.cc
Checking widelands/src/editor/ui_menus/editor_main_menu_random_map.cc...
[widelands/src/editor/ui_menus/editor_main_menu_random_map.cc] ->
[widelands/src/editor/ui_menus/editor_main_menu_random_map.cc:97]: (error)
Internal error. Token::Match called with varid 0. Please report this to
Cppcheck developers
The files in question are available by checking out the Widelands source code
(bzr branch lp:widelands), or directly at
http://bazaar.launchpad.net/~widelands-dev/widelands/trunk/files/head:/src/editor/ui_menus/
I haven't seen this message before so I checked the same files with cppcheck
1.55 (on an Arch system, but should be the same) and there it ran fine without
any problems. Therefore I suspect this might be a regression.
Hope you can take a look at this and/or forward the bug if appropriate.
Best regards,
Hans Joachim Desserud
--- End Message ---
--- Begin Message ---
Source: cppcheck
Source-Version: 1.57-1
We believe that the bug you reported is fixed in the latest version of
cppcheck, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Reijo Tomperi <[email protected]> (supplier of updated cppcheck
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sun, 04 Nov 2012 23:32:19 +0200
Source: cppcheck
Binary: cppcheck
Architecture: source amd64
Version: 1.57-1
Distribution: unstable
Urgency: low
Maintainer: Reijo Tomperi <[email protected]>
Changed-By: Reijo Tomperi <[email protected]>
Description:
cppcheck - tool for static C/C++ code analysis
Closes: 686976
Changes:
cppcheck (1.57-1) unstable; urgency=low
.
* New upstream release
* control: debhelper requirement upgraded from 8 to 9
* control: removed hardening-includes
* compat: upgraded from 8 to 9
* rules: deletet a lot lines related to hardening
* Fix internal error in Cppcheck, Closes: #686976
Checksums-Sha1:
068b8a2525a4df0a738eb3c9194aaa6bf737bc6b 1165 cppcheck_1.57-1.dsc
28be1ef590147517669747a4a3022bdb9bfd7fcc 1513423 cppcheck_1.57.orig.tar.gz
0f14ffee2c5debcaca3899baf094f42398fb9a90 5778 cppcheck_1.57-1.debian.tar.gz
c31d7e870e2388862b59393e9767ff1fb2d12aee 905678 cppcheck_1.57-1_amd64.deb
Checksums-Sha256:
a28ae48e20ef397212bd50db92885c595ae737feb7a701715315e9d07c5951db 1165
cppcheck_1.57-1.dsc
7bdfd4c44db37f6d2e29ab315ea292994bce397b9531e8cfe04d4c2967ed27bc 1513423
cppcheck_1.57.orig.tar.gz
bcbd92234b1497abf2b4adb1df2053ce806148399a7559d689ea33b9dbbceda3 5778
cppcheck_1.57-1.debian.tar.gz
1b80c69fdd9f1aae41509c79972ce510b44f06821f9ba8a38f8b483c169d854f 905678
cppcheck_1.57-1_amd64.deb
Files:
1774c140859949ee42ef774885bec23f 1165 devel optional cppcheck_1.57-1.dsc
e54df80e560148eea2aaee9ed993fe2b 1513423 devel optional
cppcheck_1.57.orig.tar.gz
6a37cfa61e129ae370a06b4019ef1f08 5778 devel optional
cppcheck_1.57-1.debian.tar.gz
41a559dd8eb25df45e2acd3f10fc1be2 905678 devel optional
cppcheck_1.57-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlCYBNoACgkQt2NXKBU/+UC5lACbBuynPXVUxlAsoKsexXHwBIci
bHYAn2mke6F0x8qEjg3cMerjjYnzX5Lx
=PgKX
-----END PGP SIGNATURE-----
--- End Message ---