Your message dated Wed, 19 Jan 2011 21:17:07 +0000 with message-id <[email protected]> and subject line Bug#610248: fixed in arrayprobe 2.0-3.1 has caused the Debian Bug report #610248, regarding Assertion error on squeeze/i386 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 610248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610248 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: arrayprobe Version: 2.0-3 Severity: grave Hi, we're running arrayprobe on spohr.debian.org. After upgrading to squeeze it no longer works at all: weasel@spohr:~$ sudo arrayprobe arrayprobe: malloc.c:3097: sYSMALLOc: Assertion `(old_top == (((mbinptr) (((char *) &((av)->bins[((1) - 1) * 2])) - __builtin_offsetof (struct malloc_chunk, fd)))) && old_size == 0) || ((unsigned long) (old_size) >= (unsigned long)((((__builtin_offsetof (struct malloc_chunk, fd_nextsize))+((2 * (sizeof(size_t))) - 1)) & ~((2 * (sizeof(size_t))) - 1))) && ((old_top)->size & 0x1) && ((unsigned long)old_end & pagemask) == 0)' failed. weasel@spohr:~$ sudo strace arrayprobe execve("/usr/bin/arrayprobe", ["arrayprobe"], [/* 15 vars */]) = 0 brk(0) = 0x9404000 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) mmap2(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7888000 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) open("/etc/ld.so.cache", O_RDONLY) = 3 fstat64(3, {st_mode=S_IFREG|0644, st_size=29238, ...}) = 0 mmap2(NULL, 29238, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7880000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/i686/cmov/libc.so.6", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\320m\1\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0755, st_size=1323460, ...}) = 0 mmap2(NULL, 1333608, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb773a000 mmap2(0xb787a000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x13f) = 0xb787a000 mmap2(0xb787d000, 10600, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb787d000 close(3) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7739000 set_thread_area({entry_number:-1 -> 6, base_addr:0xb77396c0, limit:1048575, seg_32bit:1, contents:0, read_exec_only:0, limit_in_pages:1, seg_not_present:0, useable:1}) = 0 mprotect(0xb787a000, 8192, PROT_READ) = 0 mprotect(0xb78a6000, 4096, PROT_READ) = 0 munmap(0xb7880000, 29238) = 0 brk(0) = 0x9404000 brk(0x9425000) = 0x9425000 open("/dev/cciss/c0d0", O_RDWR) = 3 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec) = 0 write(2, "arrayprobe: malloc.c:3097: sYSMA"..., 435arrayprobe: malloc.c:3097: sYSMALLOc: Assertion `(old_top == (((mbinptr) (((char *) &((av)->bins[((1) - 1) * 2])) - __builtin_offsetof (struct malloc_chunk, fd)))) && old_size == 0) || ((unsigned long) (old_size) >= (unsigned long)((((__builtin_offsetof (struct malloc_chunk, fd_nextsize))+((2 * (sizeof(size_t))) - 1)) & ~((2 * (sizeof(size_t))) - 1))) && ((old_top)->size & 0x1) && ((unsigned long)old_end & pagemask) == 0)' failed. ) = 435 rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0 gettid() = 10401 tgkill(10401, 10401, SIGABRT) = 0 --- SIGABRT (Aborted) @ 0 (0) --- +++ killed by SIGABRT +++ Cheers, weasel
--- End Message ---
--- Begin Message ---Source: arrayprobe Source-Version: 2.0-3.1 We believe that the bug you reported is fixed in the latest version of arrayprobe, which is due to be installed in the Debian FTP archive: arrayprobe_2.0-3.1.diff.gz to main/a/arrayprobe/arrayprobe_2.0-3.1.diff.gz arrayprobe_2.0-3.1.dsc to main/a/arrayprobe/arrayprobe_2.0-3.1.dsc arrayprobe_2.0-3.1_i386.deb to main/a/arrayprobe/arrayprobe_2.0-3.1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Adam D. Barratt <[email protected]> (supplier of updated arrayprobe package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 19 Jan 2011 19:36:34 +0000 Source: arrayprobe Binary: arrayprobe Architecture: source i386 Version: 2.0-3.1 Distribution: unstable Urgency: high Maintainer: Matt Taggart <[email protected]> Changed-By: Adam D. Barratt <[email protected]> Description: arrayprobe - command line HP (Compaq) SmartArray status checker Closes: 610248 Changes: arrayprobe (2.0-3.1) unstable; urgency=high . * Non-maintainer upload with maintainer's consent. * Avoid leaking memory by allocating a structure multiple times. * Allocate arrays of the correct size to avoid crashes due to malloc errors. (Closes: #610248) Checksums-Sha1: 9e28561bd206dde1fc1a8043d4177bbc9ff90c2f 1660 arrayprobe_2.0-3.1.dsc 5a90379f1e118807d157960e848f860b68b912d4 53308 arrayprobe_2.0-3.1.diff.gz e94ec999afbdc5f1491d5298bc16d7dd179c8539 9846 arrayprobe_2.0-3.1_i386.deb Checksums-Sha256: 7d3e4c8c9d4fe8525f88576dc765aed238da6885938280260c2b3a8443c15450 1660 arrayprobe_2.0-3.1.dsc 7bec7edc3d09fcb6f1c671f9556563555abc69983e34c531d427fd7621c42a0e 53308 arrayprobe_2.0-3.1.diff.gz b2ac0040e7d0f0402e9b1088b4193f204dcc15bac56c681487aab6f409f574f4 9846 arrayprobe_2.0-3.1_i386.deb Files: 1e4e0813a64d6747d49c128031dc0fe1 1660 admin extra arrayprobe_2.0-3.1.dsc 9b1790c4382fad3e31da84f41e8caaa6 53308 admin extra arrayprobe_2.0-3.1.diff.gz 30a8cf1bbe4a85c035180cc475346ccf 9846 admin extra arrayprobe_2.0-3.1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJNN1ICAAoJEMXOXcLFQs1ZkOMP/A/DdfhvNpBYTkmeESx1lZZ5 zREhvYKhJI5u7Yi4AJSAiP5//1THM55WEYpYfZhAklb6lvUi3QPLkDCcFfT6ULqw 2uCAgbZxdszXD5Sm0v4ZhnvFaFuj/oHmbNDIO/L07ArYFDb2M2O/ECAKhyKRi7i4 j5L/V95fGjk7wALhOzlJH19alYkH9BbP794QKdzjp2EqyRZ20Tp18hT1a/u9sk1Q m0urbgpN6pvJ8A3NOZttO380AYf/Y4q/E71unGAJJDoPRkagHlAUSgVmWwmYHTTz wlO+QfNWY/+/mfB11CtVzA7FMeDAXmtmab+ZeP/GvzUEBC+SrQK3wRSWh/UL7OTP M7y2iWNoOzw8JxsYDmRyagIWDySxihGji9JragkUp7jhBiS/oV3FYbidhU7r7vXv nFvV//SDNkTGgYvpJUklRNT2Tz/Qc0QvbhtoFhdP804T7WUJztHTWpoQ8j2pmAaq 6onGw+lyEm9jrg+ZCySralZy0EtQLYS/HA7CTXhcTEp8xvBi+TYlxeIoahybeD5z Fi1vHq+ug0B9b1o1UBGPW0glsceYCbVMOx5z+fl3VCreFZKKTWtKsc3RiMth4oCn NR/zKiqBGSSOnV2tJP1ooFRokKwlKSGDQ3Y3RlKtsqp8gVYieE00sEB3ZlLqLE2Z eGur19wwSjxNbwegjn/2 =F1IM -----END PGP SIGNATURE-----
--- End Message ---

