****************************************************************************** ****************** TSCHK TOUCHSTONE PARSER BUG REPORT FORM ******************* ****************************************************************************** INSTRUCTIONS To report a bug in the TSCHK Touchstone Parser. Please fill out the top part of the following form and send the complete form to info@ibis.org. A list of reported bugs is maintained at http://ibis.org/bugs/tschk. ****************************************************************************** PARSER VERSION NUMBER: 2.1.0 PLATFORM (SPARC, HP700, PC, etc.): PC OS AND VERSION: Red Hat Linux machine REPORTED BY: Walter Katz, MathWorks DATE: August 20, 2025 TITLE: TSCHK2 memory leak DESCRIPTION OF BUG: Valgrind shows a memory leak from tschk2 version 2.1.0. Two files for the libtouchstone memory leak are included. One is the text output of valgrind showing the memory leaks. The other file is a test Touchstone file to reproduce the issue. To reproduce the issue, run this command on a Red Hat Linux machine: valgrind --show-reachable=yes --show-error-list=yes --leak-check=full bin/tschk210_linux_64/tschk2 INOUT.s2p From the valgrind output, there are three memory leaks. Each one is a “loss record”. INSERT TOUCHSTONE FILE DEMONSTRATING THE BUG: Supporting files are found in the https://ibis.org/bugs/tschk/bug7 directory: - tschk2_valgrind_output.txt - valgrind output - INOUT.s2p - test Touchstone file ****************************************************************************** ******************** BELOW FOR ADMINISTRATION AND TRACKING ******************* ****************************************************************************** BUG NUMBER: 7 SEVERITY: [FATAL, SEVERE, MODERATE, ANNOYING, ENHANCEMENT] SEVERE PRIORITY: [HIGH, MEDIUM, LOW] MEDIUM STATUS: [OPEN, CLOSED, WILL NOT FIX, NOT A BUG] OPEN FIXED VERSION: FIXED DATE: NOTES ON BUG FIX: ****************************************************************************** ******************************************************************************