On Sun, 2011-01-16 at 18:34 +0100, Peter Palfrader wrote:
> we're running arrayprobe on spohr.debian.org.  After upgrading to
> squeeze it no longer works at all:
> 
> weasel@spohr:~$ sudo arrayprobe
> arrayprobe: malloc.c:3097: sYSMALLOc: Assertion `(old_top == (((mbinptr) 
> (((char *) &((av)->bins[((1) - 1) * 2])) - __builtin_offsetof (struct 
> malloc_chunk, fd)))) && old_size == 0) || ((unsigned long) (old_size) >= 
> (unsigned long)((((__builtin_offsetof (struct malloc_chunk, fd_nextsize))+((2 
> * (sizeof(size_t))) - 1)) & ~((2 * (sizeof(size_t))) - 1))) && 
> ((old_top)->size & 0x1) && ((unsigned long)old_end & pagemask) == 0)' failed.

Whilst looking at this, I noticed that there are a couple of other bugs
open against the package regarding malloc warnings (#496676 and
#514028).

The issues reported in both bugs are memory corruption warnings, but I
do wonder if this isn't another instance of the same issue and
improved / increased malloc checks in squeeze have simply altered the
manner in which it presents; unfortunately I don't have any suitable
hardware available with which to test.

The patch in #496676 fixes two occurrences of essentially the same bug,
so looks like the better choice of the two.  fwiw, Gentoo have a related
patch for a memory leak in
http://bugs.gentoo.org/attachment.cgi?id=216343&action=view , which
again only fixes one of the two incorrectly-sized mallocs.

Regards,

Adam




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to