Your message dated Wed, 19 Jan 2011 21:17:07 +0000
with message-id <e1pffot-0005rw...@franck.debian.org>
and subject line Bug#610248: fixed in arrayprobe 2.0-3.1
has caused the Debian Bug report #610248,
regarding Assertion error on squeeze/i386
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
610248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610248
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: arrayprobe
Version: 2.0-3
Severity: grave

Hi,

we're running arrayprobe on spohr.debian.org.  After upgrading to
squeeze it no longer works at all:

weasel@spohr:~$ sudo arrayprobe
arrayprobe: malloc.c:3097: sYSMALLOc: Assertion `(old_top == (((mbinptr) 
(((char *) &((av)->bins[((1) - 1) * 2])) - __builtin_offsetof (struct 
malloc_chunk, fd)))) && old_size == 0) || ((unsigned long) (old_size) >= 
(unsigned long)((((__builtin_offsetof (struct malloc_chunk, fd_nextsize))+((2 * 
(sizeof(size_t))) - 1)) & ~((2 * (sizeof(size_t))) - 1))) && ((old_top)->size & 
0x1) && ((unsigned long)old_end & pagemask) == 0)' failed.


weasel@spohr:~$ sudo strace arrayprobe
execve("/usr/bin/arrayprobe", ["arrayprobe"], [/* 15 vars */]) = 0
brk(0)                                  = 0x9404000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap2(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7888000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY)      = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=29238, ...}) = 0
mmap2(NULL, 29238, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7880000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/i686/cmov/libc.so.6", O_RDONLY) = 3
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\320m\1\0004\0\0\0"..., 
512) = 512
fstat64(3, {st_mode=S_IFREG|0755, st_size=1323460, ...}) = 0
mmap2(NULL, 1333608, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 
0xb773a000
mmap2(0xb787a000, 12288, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x13f) = 0xb787a000
mmap2(0xb787d000, 10600, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb787d000
close(3)                                = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0xb7739000
set_thread_area({entry_number:-1 -> 6, base_addr:0xb77396c0, limit:1048575, 
seg_32bit:1, contents:0, read_exec_only:0, limit_in_pages:1, seg_not_present:0, 
useable:1}) = 0
mprotect(0xb787a000, 8192, PROT_READ)   = 0
mprotect(0xb78a6000, 4096, PROT_READ)   = 0
munmap(0xb7880000, 29238)               = 0
brk(0)                                  = 0x9404000
brk(0x9425000)                          = 0x9425000
open("/dev/cciss/c0d0", O_RDWR)         = 3
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
ioctl(3, CCISS_PASSTHRU, 0xbf94d0ec)    = 0
write(2, "arrayprobe: malloc.c:3097: sYSMA"..., 435arrayprobe: malloc.c:3097: 
sYSMALLOc: Assertion `(old_top == (((mbinptr) (((char *) &((av)->bins[((1) - 1) 
* 2])) - __builtin_offsetof (struct malloc_chunk, fd)))) && old_size == 0) || 
((unsigned long) (old_size) >= (unsigned long)((((__builtin_offsetof (struct 
malloc_chunk, fd_nextsize))+((2 * (sizeof(size_t))) - 1)) & ~((2 * 
(sizeof(size_t))) - 1))) && ((old_top)->size & 0x1) && ((unsigned long)old_end 
& pagemask) == 0)' failed.
) = 435
rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0
gettid()                                = 10401
tgkill(10401, 10401, SIGABRT)           = 0
--- SIGABRT (Aborted) @ 0 (0) ---
+++ killed by SIGABRT +++


Cheers,
weasel



--- End Message ---
--- Begin Message ---
Source: arrayprobe
Source-Version: 2.0-3.1

We believe that the bug you reported is fixed in the latest version of
arrayprobe, which is due to be installed in the Debian FTP archive:

arrayprobe_2.0-3.1.diff.gz
  to main/a/arrayprobe/arrayprobe_2.0-3.1.diff.gz
arrayprobe_2.0-3.1.dsc
  to main/a/arrayprobe/arrayprobe_2.0-3.1.dsc
arrayprobe_2.0-3.1_i386.deb
  to main/a/arrayprobe/arrayprobe_2.0-3.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 610...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adam D. Barratt <a...@adam-barratt.org.uk> (supplier of updated arrayprobe 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 19 Jan 2011 19:36:34 +0000
Source: arrayprobe
Binary: arrayprobe
Architecture: source i386
Version: 2.0-3.1
Distribution: unstable
Urgency: high
Maintainer: Matt Taggart <tagg...@debian.org>
Changed-By: Adam D. Barratt <a...@adam-barratt.org.uk>
Description: 
 arrayprobe - command line HP (Compaq) SmartArray status checker
Closes: 610248
Changes: 
 arrayprobe (2.0-3.1) unstable; urgency=high
 .
   * Non-maintainer upload with maintainer's consent.
   * Avoid leaking memory by allocating a structure multiple times.
   * Allocate arrays of the correct size to avoid crashes due to malloc
     errors.  (Closes: #610248)
Checksums-Sha1: 
 9e28561bd206dde1fc1a8043d4177bbc9ff90c2f 1660 arrayprobe_2.0-3.1.dsc
 5a90379f1e118807d157960e848f860b68b912d4 53308 arrayprobe_2.0-3.1.diff.gz
 e94ec999afbdc5f1491d5298bc16d7dd179c8539 9846 arrayprobe_2.0-3.1_i386.deb
Checksums-Sha256: 
 7d3e4c8c9d4fe8525f88576dc765aed238da6885938280260c2b3a8443c15450 1660 
arrayprobe_2.0-3.1.dsc
 7bec7edc3d09fcb6f1c671f9556563555abc69983e34c531d427fd7621c42a0e 53308 
arrayprobe_2.0-3.1.diff.gz
 b2ac0040e7d0f0402e9b1088b4193f204dcc15bac56c681487aab6f409f574f4 9846 
arrayprobe_2.0-3.1_i386.deb
Files: 
 1e4e0813a64d6747d49c128031dc0fe1 1660 admin extra arrayprobe_2.0-3.1.dsc
 9b1790c4382fad3e31da84f41e8caaa6 53308 admin extra arrayprobe_2.0-3.1.diff.gz
 30a8cf1bbe4a85c035180cc475346ccf 9846 admin extra arrayprobe_2.0-3.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=F1IM
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to