Your message dated Tue, 15 Feb 2005 19:32:11 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#205587: fixed in mysql-dfsg-4.1 4.1.10-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 15 Aug 2003 14:27:43 +0000
>From [EMAIL PROTECTED] Fri Aug 15 09:27:40 2003
Return-path: <[EMAIL PROTECTED]>
Received: from netflow.cesnet.cz [195.113.144.190] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 19nfYK-00046D-00; Fri, 15 Aug 2003 09:27:40 -0500
Received: from cesnet.cz (doktor [195.113.134.193])
        by netflow.cesnet.cz (Postfix) with ESMTP id BECFEDB926
        for <[EMAIL PROTECTED]>; Fri, 15 Aug 2003 16:27:38 +0200 (CEST)
Message-ID: <[EMAIL PROTECTED]>
Date: Fri, 15 Aug 2003 16:27:38 +0200
From: Jan Nejman <[EMAIL PROTECTED]>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) 
Gecko/20030624
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: libmysqlclient-dev unitialized values and some value aren't freed
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-4.0 required=4.0
        tests=BAYES_10,HAS_PACKAGE,PENISACCENT,USER_AGENT_MOZILLA_UA
        version=2.53-bugs.debian.org_2003_07_20
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_07_20 
(1.174.2.15-2003-03-30-exp)

Package: libmysqlclient-dev
Version: 4.0.13-3

For detecting memleak I'm using tool Valgrind ...
Problem is in package libmysqlclient probably
valgrind tool say:
1. Conditional jump or move depends on uninitialised value

2. LEAK SUMMARY:
==1798==    definitely lost: 30 bytes in 2 blocks.
==1798==    possibly lost:   0 bytes in 0 blocks.
==1798==    still reachable: 0 bytes in 0 blocks.

Conditional jump must be in function mysql_init ...
memleak is maybe related to charset ... but I'm not sure.

For problem demonstrating I create short code:
#include "malloc.h"
#include "stdlib.h"
#include "mysql/mysql.h"
#include "mysql/mysqld_error.h"

int main() {
   MYSQL *a;
   a=mysql_init(NULL);
   mysql_close(a);
   return 0;
}


This is valgrind's report:

netflow:/netflow/devel/nfc# valgrind -v --leak-check=yes 
--show-reachable=yes ./a.out
==1798== Memcheck, a.k.a. Valgrind, a memory error detector for x86-linux.
==1798== Copyright (C) 2002, and GNU GPL'd, by Julian Seward.
==1798== Using valgrind-1.9.6, a program instrumentation system for 
x86-linux.
==1798== Copyright (C) 2000-2002, and GNU GPL'd, by Julian Seward.
==1798== Startup, with flags:
==1798==    --suppressions=/usr/local/lib/valgrind/default.supp
==1798==    -v
==1798==    --leak-check=yes
==1798==    --show-reachable=yes
==1798== Reading suppressions file: /usr/local/lib/valgrind/default.supp
==1798== Estimated CPU clock rate is 870 MHz
==1798==
==1798== Reading syms from /netflow/devel/nfc/a.out
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/ld-2.3.2.so
==1798==    object doesn't have any debug info
==1798== Reading syms from /usr/local/lib/valgrind/vgskin_memcheck.so
==1798== Reading syms from /usr/local/lib/valgrind/valgrind.so
==1798== Reading syms from /usr/lib/libmysqlclient.so.12.0.0
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libc-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /usr/lib/libz.so.1.1.4
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libcrypt-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libnsl-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libm-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /usr/lib/i686/cmov/libssl.so.0.9.7
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /usr/lib/i686/cmov/libcrypto.so.0.9.7
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libdl-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libnss_db-2.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /lib/libnss_files-2.3.2.so
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Reading syms from /usr/lib/libdb3.so.3.0.2
==1798==    object doesn't have a symbol table
==1798==    object doesn't have any debug info
==1798== Conditional jump or move depends on uninitialised value(s)
==1798==    at 0x40007EB8: _dl_relocate_object_internal (in 
/lib/ld-2.3.2.so)
==1798==    by 0x40332D44: (within /lib/libc-2.3.2.so)
==1798==    by 0x4000A19E: _dl_catch_error_internal (in /lib/ld-2.3.2.so)
==1798==    by 0x40332F89: _dl_open (in /lib/libc-2.3.2.so)
==1798==
==1798== Conditional jump or move depends on uninitialised value(s)
==1798==    at 0x40007EFD: _dl_relocate_object_internal (in 
/lib/ld-2.3.2.so)
==1798==    by 0x40332D44: (within /lib/libc-2.3.2.so)
==1798==    by 0x4000A19E: _dl_catch_error_internal (in /lib/ld-2.3.2.so)
==1798==    by 0x40332F89: _dl_open (in /lib/libc-2.3.2.so)
==1798== discard syms in /lib/libnss_db-2.2.so due to munmap()
==1798== discard syms in /usr/lib/libdb3.so.3.0.2 due to munmap()
==1798== discard syms in /lib/libnss_files-2.3.2.so due to munmap()
==1798==
==1798== ERROR SUMMARY: 6 errors from 2 contexts (suppressed: 0 from 0)
==1798==
==1798== 3 errors in context 1 of 2:
==1798== Conditional jump or move depends on uninitialised value(s)
==1798==    at 0x40007EFD: _dl_relocate_object_internal (in 
/lib/ld-2.3.2.so)
==1798==    by 0x40332D44: (within /lib/libc-2.3.2.so)
==1798==    by 0x4000A19E: _dl_catch_error_internal (in /lib/ld-2.3.2.so)
==1798==    by 0x40332F89: _dl_open (in /lib/libc-2.3.2.so)
==1798==
==1798== 3 errors in context 2 of 2:
==1798== Conditional jump or move depends on uninitialised value(s)
==1798==    at 0x40007EB8: _dl_relocate_object_internal (in 
/lib/ld-2.3.2.so)
==1798==    by 0x40332D44: (within /lib/libc-2.3.2.so)
==1798==    by 0x4000A19E: _dl_catch_error_internal (in /lib/ld-2.3.2.so)
==1798==    by 0x40332F89: _dl_open (in /lib/libc-2.3.2.so)
==1798== IN SUMMARY: 6 errors from 2 contexts (suppressed: 0 from 0)
==1798==
==1798== malloc/free: in use at exit: 30 bytes in 2 blocks.
==1798== malloc/free: 61 allocs, 59 frees, 6476 bytes allocated.
==1798==
==1798== searching for pointers to 2 not-freed blocks.
==1798== checked 5160116 bytes.
==1798==
==1798== 4 bytes in 1 blocks are definitely lost in loss record 1 of 2
==1798==    at 0x4015E394: malloc (vg_clientfuncs.c:103)
==1798==    by 0x400045E8: _dl_map_object_from_fd (in /lib/ld-2.3.2.so)
==1798==    by 0x400054D6: _dl_map_object_internal (in /lib/ld-2.3.2.so)
==1798==    by 0x40008DA0: openaux (in /lib/ld-2.3.2.so)
==1798==
==1798== 26 bytes in 1 blocks are definitely lost in loss record 2 of 2
==1798==    at 0x4015E394: malloc (vg_clientfuncs.c:103)
==1798==    by 0x4149F5AE: ???
==1798==    by 0x4149F486: ???
==1798==    by 0x41474D8E: ???
==1798==
==1798== LEAK SUMMARY:
==1798==    definitely lost: 30 bytes in 2 blocks.
==1798==    possibly lost:   0 bytes in 0 blocks.
==1798==    still reachable: 0 bytes in 0 blocks.
==1798==         suppressed: 0 bytes in 0 blocks.
==1798==
--1798--     TT/TC: 0 tc sectors discarded.
--1798--            1932 chainings, 0 unchainings.
--1798-- translate: new     3010 (47741 -> 658702; ratio 137:10)
--1798--            discard 513 (9256 -> 117832; ratio 127:10).
--1798--  dispatch: 100000 jumps (bb entries), of which 18623 (18%) were 
unchained.
--1798--            4/3326 major/minor sched events.  3128 tt_fast misses.
--1798-- reg-alloc: 470 t-req-spill, 123737+2526 orig+spill uis, 15287 
total-reg-r.
--1798--    sanity: 5 cheap, 1 expensive checks.
--1798--    ccalls: 14059 C calls, 54% saves+restores avoided (45264 bytes)
--1798--            17983 args, avg 0.89 setup instrs each (3842 bytes)
--1798--            0% clear the stack (42177 bytes)
--1798--            5143 retvals, 33% of reg-reg movs avoided (3308 bytes)

I'm using Linux netflow 2.4.21 #2 SMP Mon Jun 23 14:05:06 CEST 2003 i686 
GNU/Linux and libc-2.3.2.so ...

                Thank you, Jan Nejman





---------------------------------------
Received: (at 205587-close) by bugs.debian.org; 16 Feb 2005 00:38:06 +0000
>From [EMAIL PROTECTED] Tue Feb 15 16:38:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1D1DCg-0006St-00; Tue, 15 Feb 2005 16:38:06 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1D1D6x-0005db-00; Tue, 15 Feb 2005 19:32:11 -0500
From: Christian Hammers <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#205587: fixed in mysql-dfsg-4.1 4.1.10-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 15 Feb 2005 19:32:11 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: mysql-dfsg-4.1
Source-Version: 4.1.10-1

We believe that the bug you reported is fixed in the latest version of
mysql-dfsg-4.1, which is due to be installed in the Debian FTP archive:

libmysqlclient14-dev_4.1.10-1_i386.deb
  to pool/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.10-1_i386.deb
libmysqlclient14_4.1.10-1_i386.deb
  to pool/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.10-1_i386.deb
mysql-client-4.1_4.1.10-1_i386.deb
  to pool/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.10-1_i386.deb
mysql-common-4.1_4.1.10-1_all.deb
  to pool/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.10-1_all.deb
mysql-dfsg-4.1_4.1.10-1.diff.gz
  to pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.10-1.diff.gz
mysql-dfsg-4.1_4.1.10-1.dsc
  to pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.10-1.dsc
mysql-dfsg-4.1_4.1.10.orig.tar.gz
  to pool/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.10.orig.tar.gz
mysql-server-4.1_4.1.10-1_i386.deb
  to pool/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.10-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Hammers <[EMAIL PROTECTED]> (supplier of updated mysql-dfsg-4.1 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 15 Feb 2005 23:47:02 +0100
Source: mysql-dfsg-4.1
Binary: libmysqlclient14-dev mysql-common-4.1 libmysqlclient14 mysql-server-4.1 
mysql-client-4.1
Architecture: source i386 all
Version: 4.1.10-1
Distribution: unstable
Urgency: low
Maintainer: Christian Hammers <[EMAIL PROTECTED]>
Changed-By: Christian Hammers <[EMAIL PROTECTED]>
Description: 
 libmysqlclient14 - mysql database client library
 libmysqlclient14-dev - mysql database development files
 mysql-client-4.1 - mysql database client binaries
 mysql-common-4.1 - mysql database common files (e.g. /etc/mysql/my.cnf)
 mysql-server-4.1 - mysql database server binaries
Closes: 205587 295170 295247
Changes: 
 mysql-dfsg-4.1 (4.1.10-1) unstable; urgency=low
 .
   * New upstream version.
   * Upstream fixed memleak bug. Closes: #205587
   * Added debian/copyright.more for personal reference.
   * Lowered default query cache size as suggested by Arjen from MySQL.
   * Switched from log to log-bin as suggested by Arjen from MySQL.
   * Fixed typo in my.cnf (thanks to Sebastian Feltel). Closes: #295247
   * Replaced --defaults-extra-file by --defaults-file in Debian scripts
     as former lets password/host etc be overwriteable by /root/.my.cnf.
     Added socket to /etc/mysql/debian.cnf to let it work. (thanks to
     SATOH Fumiyasu). Closes: #295170
Files: 
 23cf1143aba7fe1bc12cb4286638805a 977 misc optional mysql-dfsg-4.1_4.1.10-1.dsc
 27b27b74f430aaeb77fb8d4e6f32ac4d 22563415 misc optional 
mysql-dfsg-4.1_4.1.10.orig.tar.gz
 8c39b274e42da6db7629d5a16d0a4113 157617 misc optional 
mysql-dfsg-4.1_4.1.10-1.diff.gz
 d24de348848c6bbf9e2b192784bb104a 32440 misc optional 
mysql-common-4.1_4.1.10-1_all.deb
 0e08f92b6d687aa9d5b8b89e0791adfe 1410640 libs optional 
libmysqlclient14_4.1.10-1_i386.deb
 d780c8c4ec7689a941edc59b7c03dba8 2519130 libdevel optional 
libmysqlclient14-dev_4.1.10-1_i386.deb
 9030df9258e973cdd37f624aa6c4eb69 824896 misc optional 
mysql-client-4.1_4.1.10-1_i386.deb
 45943b12e345df2819e5c66b4e1cada5 14533874 misc optional 
mysql-server-4.1_4.1.10-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iEYEARECAAYFAkISkN4ACgkQkR9K5oahGOZKTACff14aD8LzRTorf4djXoj+83Qf
DdUAnjUaEOfs3eU3Sp/nOkRX7z3ub59f
=WLIQ
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to