On Sun, 2011-01-16 at 18:34 +0100, Peter Palfrader wrote: > we're running arrayprobe on spohr.debian.org. After upgrading to > squeeze it no longer works at all: > > weasel@spohr:~$ sudo arrayprobe > arrayprobe: malloc.c:3097: sYSMALLOc: Assertion `(old_top == (((mbinptr) > (((char *) &((av)->bins[((1) - 1) * 2])) - __builtin_offsetof (struct > malloc_chunk, fd)))) && old_size == 0) || ((unsigned long) (old_size) >= > (unsigned long)((((__builtin_offsetof (struct malloc_chunk, fd_nextsize))+((2 > * (sizeof(size_t))) - 1)) & ~((2 * (sizeof(size_t))) - 1))) && > ((old_top)->size & 0x1) && ((unsigned long)old_end & pagemask) == 0)' failed.
Whilst looking at this, I noticed that there are a couple of other bugs open against the package regarding malloc warnings (#496676 and #514028). The issues reported in both bugs are memory corruption warnings, but I do wonder if this isn't another instance of the same issue and improved / increased malloc checks in squeeze have simply altered the manner in which it presents; unfortunately I don't have any suitable hardware available with which to test. The patch in #496676 fixes two occurrences of essentially the same bug, so looks like the better choice of the two. fwiw, Gentoo have a related patch for a memory leak in http://bugs.gentoo.org/attachment.cgi?id=216343&action=view , which again only fixes one of the two incorrectly-sized mallocs. Regards, Adam -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org