Bug 503990 - clurgmgrd reports unaligned access
clurgmgrd reports unaligned access
Status: CLOSED DUPLICATE of bug 171236
Product: Red Hat Cluster Suite
Classification: Red Hat
Component: rgmanager (Show other bugs)
4
ia64 Linux
low Severity medium
: rc
: ---
Assigned To: Lon Hohberger
Cluster QE
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-06-03 13:44 EDT by Jaroslav Kortus
Modified: 2009-06-17 19:06 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-06-17 19:06:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jaroslav Kortus 2009-06-03 13:44:29 EDT
Description of problem:
clurgmgrd reports unaligned access

Version-Release number of selected component (if applicable):
rgmanager-1.9.87-1.el4

How reproducible:
setup cluster, read /var/log/messages

Steps to Reproduce:
1. install cluster
2. create simple service
3. start services and see /var/log/messages
  
Actual results:
clurgmgrd reports unaligned access
May 31 04:02:26 a2 kernel: clurgmgrd(22318): unaligned access to 0x2000000003a76804, ip=0x40000000000162e1

Expected results:
no unaligned access messages

Additional info:
in idle state with services started these pairs occured:
0x2000000001182804, ip=0x40000000000162e1
0x2000000001182804, ip=0x4000000000016300
0x200000000118280c, ip=0x4000000000016341
0x200000000118280c, ip=0x4000000000016360
0x2000000002676804, ip=0x40000000000162e1
0x2000000002676804, ip=0x4000000000016300
0x200000000267680c, ip=0x4000000000016341
0x200000000267680c, ip=0x4000000000016360
0x2000000003076804, ip=0x40000000000162e1
0x2000000003076804, ip=0x4000000000016300
0x200000000307680c, ip=0x4000000000016341
0x200000000307680c, ip=0x4000000000016360
0x2000000003a76804, ip=0x40000000000162e1
0x2000000003a76804, ip=0x4000000000016300
0x2000000003a7680c, ip=0x4000000000016341
0x2000000003a7680c, ip=0x4000000000016360

During regression tests following pairs could be seen:
clurgmgrd: 0x20000000011825b4,ip=0x400000000001b2a0
clurgmgrd: 0x20000000011825b4,ip=0x400000000001b2b0
clurgmgrd: 0x20000000011825bc,ip=0x400000000001b2d0
clurgmgrd: 0x20000000011825bc,ip=0x400000000001b2e0
clurgmgrd: 0x2000000001182804,ip=0x40000000000162e1
clurgmgrd: 0x2000000001182804,ip=0x4000000000016300
clurgmgrd: 0x2000000001182804,ip=0x400000000001fba0
clurgmgrd: 0x200000000118280c,ip=0x4000000000016341
clurgmgrd: 0x200000000118280c,ip=0x4000000000016360
clurgmgrd: 0x200000000118280c,ip=0x400000000001fbc0
clurgmgrd: 0x200000000118281c,ip=0x400000000001fc20
clurgmgrd: 0x2000000001cc65b4,ip=0x400000000001b2a0
clurgmgrd: 0x2000000001cc65b4,ip=0x400000000001b2b0
clurgmgrd: 0x2000000001cc65bc,ip=0x400000000001b2d0
clurgmgrd: 0x2000000001cc65bc,ip=0x400000000001b2e0
clurgmgrd: 0x2000000001cc6804,ip=0x40000000000162e1
clurgmgrd: 0x2000000001cc6804,ip=0x4000000000016300
clurgmgrd: 0x2000000001cc6804,ip=0x400000000001fba0
clurgmgrd: 0x2000000001cc680c,ip=0x4000000000016341
clurgmgrd: 0x2000000001cc680c,ip=0x4000000000016360
clurgmgrd: 0x2000000001cc680c,ip=0x400000000001fbc0
clurgmgrd: 0x2000000001cc681c,ip=0x400000000001fc20
clurgmgrd: 0x2000000001e06804,ip=0x40000000000162e1
clurgmgrd: 0x2000000001e06804,ip=0x4000000000016300
clurgmgrd: 0x2000000001e06804,ip=0x400000000001fba0
clurgmgrd: 0x2000000001e0680c,ip=0x4000000000016341
clurgmgrd: 0x2000000001e0680c,ip=0x4000000000016360
clurgmgrd: 0x2000000001e0680c,ip=0x400000000001fbc0
clurgmgrd: 0x2000000001e0681c,ip=0x400000000001fc20
clurgmgrd: 0x2000000002676804,ip=0x40000000000162e1
clurgmgrd: 0x2000000002676804,ip=0x4000000000016300
clurgmgrd: 0x200000000267680c,ip=0x4000000000016341
clurgmgrd: 0x200000000267680c,ip=0x4000000000016360
clurgmgrd: 0x20000000026c6804,ip=0x40000000000162e1
clurgmgrd: 0x20000000026c6804,ip=0x4000000000016300
clurgmgrd: 0x20000000026c680c,ip=0x4000000000016341
clurgmgrd: 0x20000000026c680c,ip=0x4000000000016360
clurgmgrd: 0x20000000026d65b4,ip=0x400000000001b2a0
clurgmgrd: 0x20000000026d65b4,ip=0x400000000001b2b0
clurgmgrd: 0x20000000026d65bc,ip=0x400000000001b2d0
clurgmgrd: 0x20000000026d65bc,ip=0x400000000001b2e0
clurgmgrd: 0x20000000026d6804,ip=0x40000000000162e1
clurgmgrd: 0x20000000026d6804,ip=0x4000000000016300
clurgmgrd: 0x20000000026d680c,ip=0x4000000000016341
clurgmgrd: 0x20000000026d680c,ip=0x4000000000016360
clurgmgrd: 0x20000000027ce804,ip=0x40000000000162e1
clurgmgrd: 0x20000000027ce804,ip=0x4000000000016300
clurgmgrd: 0x20000000027ce80c,ip=0x4000000000016341
clurgmgrd: 0x20000000027ce80c,ip=0x4000000000016360
clurgmgrd: 0x2000000003076804,ip=0x40000000000162e1
clurgmgrd: 0x2000000003076804,ip=0x4000000000016300
clurgmgrd: 0x200000000307680c,ip=0x4000000000016341
clurgmgrd: 0x200000000307680c,ip=0x4000000000016360
clurgmgrd: 0x20000000030c6804,ip=0x40000000000162e1
clurgmgrd: 0x20000000030c6804,ip=0x4000000000016300
clurgmgrd: 0x20000000030c680c,ip=0x4000000000016341
clurgmgrd: 0x20000000030c680c,ip=0x4000000000016360
clurgmgrd: 0x20000000030d6804,ip=0x40000000000162e1
clurgmgrd: 0x20000000030d6804,ip=0x4000000000016300
clurgmgrd: 0x20000000030d680c,ip=0x4000000000016341
clurgmgrd: 0x20000000030d680c,ip=0x4000000000016360
clurgmgrd: 0x2000000003116804,ip=0x40000000000162e1
clurgmgrd: 0x2000000003116804,ip=0x4000000000016300
clurgmgrd: 0x200000000311680c,ip=0x4000000000016341
clurgmgrd: 0x200000000311680c,ip=0x4000000000016360
clurgmgrd: 0x2000000003a76804,ip=0x40000000000162e1
clurgmgrd: 0x2000000003a76804,ip=0x4000000000016300
clurgmgrd: 0x2000000003a7680c,ip=0x4000000000016341
clurgmgrd: 0x2000000003a7680c,ip=0x4000000000016360
clurgmgrd: 0x60000fffffffb924,ip=0x400000000000cf60
clurgmgrd: 0x60000fffffffb924,ip=0x400000000000cf70
clurgmgrd: 0x60000fffffffb92c,ip=0x400000000000cf90
clurgmgrd: 0x60000fffffffb92c,ip=0x400000000000cfa0
Comment 1 Lon Hohberger 2009-06-17 19:06:23 EDT
I analyzed this a few years ago.  In order to fix all of the warnings, it's likely that we will have to change wire protocol.

https://bugzilla.redhat.com/show_bug.cgi?id=171236#c20

*** This bug has been marked as a duplicate of bug 171236 ***

Note You need to log in before you can comment on or make changes to this bug.