kerneloops assert failure: *** glibc detected *** /usr/sbin/kerneloops: free(): invalid next size (normal): 0x099254a0 ***

Bug #1026251 reported by John Lenton
26
This bug affects 3 people
Affects Status Importance Assigned to Milestone
kerneloops (Ubuntu)
Fix Released
Medium
Brian Murray
Quantal
Won't Fix
Medium
Unassigned

Bug Description

this came up during an upgrade. I don't know what caused it.

ProblemType: Crash
DistroRelease: Ubuntu 12.10
Package: kerneloops-daemon 0.12+git20090217-3ubuntu2
ProcVersionSignature: Ubuntu 3.5.0-4.4-generic 3.5.0-rc6
Uname: Linux 3.5.0-4-generic i686
ApportVersion: 2.4-0ubuntu2
Architecture: i386
AssertionMessage: *** glibc detected *** /usr/sbin/kerneloops: free(): invalid next size (normal): 0x099254a0 ***
Date: Wed Jul 18 18:18:22 2012
ExecutablePath: /usr/sbin/kerneloops
InstallationMedia: Ubuntu 10.10 "Maverick Meerkat" - Release Candidate i386 (20100928.1)
ProcCmdline: /usr/sbin/kerneloops
ProcEnviron:
 LANGUAGE=en_US:en
 TERM=xterm
 PATH=(custom, no user)
 LANG=en_US.UTF-8
 SHELL=/bin/bash
Signal: 6
SourcePackage: kerneloops
StacktraceTop:
 __libc_message (do_abort=2, fmt=0xb75e83dc "*** glibc detected *** %s: %s: 0x%s ***\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:201
 malloc_printerr (action=<optimized out>, str=<optimized out>, ptr=0x99254a0) at malloc.c:5007
 ?? ()
 ?? ()
 ?? ()
Title: kerneloops assert failure: *** glibc detected *** /usr/sbin/kerneloops: free(): invalid next size (normal): 0x099254a0 ***
UpgradeStatus: Upgraded to quantal on 2012-06-19 (29 days ago)
UserGroups:

Revision history for this message
John Lenton (chipaca) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 __libc_message (do_abort=2, fmt=0xb75e83dc "*** glibc detected *** %s: %s: 0x%s ***\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:201
 malloc_printerr (action=<optimized out>, str=<optimized out>, ptr=0x99254a0) at malloc.c:5007
 extract_oops (buffer=buffer@entry=0x9924498 "<7>[146186.372911] icmpv6_send: acast source", buflen=<optimized out>, remove_syslog=160584864, remove_syslog@entry=0) at dmesg.c:357
 scan_dmesg (unused=unused@entry=0x0) at dmesg.c:368
 main (argc=1, argv=0xbfdac784) at kerneloops.c:192

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : StacktraceSource.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in kerneloops (Ubuntu):
importance: Undecided → Medium
tags: removed: need-i386-retrace
Revision history for this message
Brian Murray (brian-murray) wrote :

I was able to recreate this by installing the new version of kerneloops which actually enables it, the previous version did not. However, a second attempt to start the kerneloops service, sudo service kerneloops start, did not cause a crash.

Changed in kerneloops (Ubuntu):
status: New → Triaged
Revision history for this message
Brian Murray (brian-murray) wrote :

Well, I guess it really did crash just not right away.

tags: added: rls-q-incoming
tags: added: kernel-da-key
Changed in kerneloops (Ubuntu Quantal):
status: New → Triaged
importance: Undecided → Medium
Changed in kerneloops (Ubuntu Quantal):
status: Triaged → Won't Fix
Changed in kerneloops (Ubuntu):
status: Triaged → In Progress
assignee: nobody → Brian Murray (brian-murray)
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package kerneloops - 0.12+git20090217-3ubuntu5

---------------
kerneloops (0.12+git20090217-3ubuntu5) trusty; urgency=medium

  [ Colin King ]
  * fix memleak and add alloc null pointer checks (LP: #1287109)
    - memleak of buffer c in writefunction()
    - null pointer checks in extract_oops() and scan_dmesg() (LP: #1026251)

  [ Brian Murray ]
  * fix null pointer check in fill_lineinfo() (LP: #1026300)
 -- Brian Murray <email address hidden> Wed, 05 Mar 2014 08:58:57 -0800

Changed in kerneloops (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.