Bug 811574

Summary: memory corruption in the glusterfs process.
Product: [Community] GlusterFS Reporter: Vijaykumar Koppad <vkoppad>
Component: coreAssignee: Raghavendra Bhat <rabhat>
Status: CLOSED DUPLICATE QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: mainlineCC: bbandari, gluster-bugs, vbellur, vinaraya
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-05-18 12:48:43 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Vijaykumar Koppad 2012-04-11 13:06:19 UTC
Description of problem:
This is the valgrind logs .. 
################################################################################
==4866== Invalid read of size 4
==4866==    at 0x60884C2: fuse_readdir_cbk (fuse-bridge.c:2317)
==4866==    by 0xA0165A0: io_stats_readdir_cbk (io-stats.c:1397)
==4866==    by 0x9E02692: mdc_readdirp_cbk (md-cache.c:1693)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x99DA3E8: ioc_readdirp_cbk (io-cache.c:1400)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x939DD0A: dht_readdirp_cbk (dht-common.c:2867)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==  Address 0xc83a778 is 168 bytes inside a block of size 171 alloc'd
==4866==    at 0x4A04A28: calloc (vg_replace_malloc.c:467)
==4866==    by 0x32290406EE: __gf_calloc (mem-pool.h:84)
==4866==    by 0x3229040E35: gf_dirent_for_name (gf-dirent.c:39)
==4866==    by 0x939D7B3: dht_readdirp_cbk (dht-common.c:2802)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==    by 0x322940AD46: rpc_transport_notify (rpc-transport.c:498)
==4866==    by 0x80ABC0E: socket_event_poll_in (socket.c:1686)
==4866==    by 0x80ABDB7: socket_event_handler (socket.c:1801)
==4866==    by 0x322903EFF0: event_dispatch_epoll (event.c:794)
==4866== 
==4866== Invalid read of size 4
==4866==    at 0x60884D8: fuse_readdir_cbk (fuse-bridge.c:2317)
==4866==    by 0xA0165A0: io_stats_readdir_cbk (io-stats.c:1397)
==4866==    by 0x9E02692: mdc_readdirp_cbk (md-cache.c:1693)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x99DA3E8: ioc_readdirp_cbk (io-cache.c:1400)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x939DD0A: dht_readdirp_cbk (dht-common.c:2867)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==  Address 0xd037590 is 176 bytes inside a block of size 177 alloc'd
==4866==    at 0x4A04A28: calloc (vg_replace_malloc.c:467)
==4866==    by 0x32290406EE: __gf_calloc (mem-pool.h:84)
==4866==    by 0x3229040E35: gf_dirent_for_name (gf-dirent.c:39)
==4866==    by 0x939D7B3: dht_readdirp_cbk (dht-common.c:2802)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==    by 0x322940AD46: rpc_transport_notify (rpc-transport.c:498)
:

version : 3.3.0qa33

Comment 1 Vijay Bellur 2012-05-18 12:48:43 UTC

*** This bug has been marked as a duplicate of bug 765201 ***