Hide Forgot
Created attachment 651
From nightly valgrind running with 3.1 branch (currently running this test again - will update its results by morning) ------------- Invalid read of size 1 ==23695== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==23695== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==23695== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==23695== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==23695== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==23695== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==23695== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==23695== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==23695== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==23695== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==23695== by 0x840F876: socket_event_poll_in (socket.c:1623) ==23695== by 0x840FC29: socket_event_handler (socket.c:1737) ==23695== Address 0xadeea6b is 3 bytes after a block of size 8 alloc'd ==23695== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==23695== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==23695== by 0x4C1A874: memdup (common-utils.h:292) ==23695== by 0x4C204BD: dict_unserialize (dict.c:2601) ==23695== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==23695== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==23695== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==23695== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==23695== by 0x840F876: socket_event_poll_in (socket.c:1623) ==23695== by 0x840FC29: socket_event_handler (socket.c:1737) ==23695== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==23695== by 0x4C54450: event_dispatch_epoll (event.c:876) ==23695== ==23695== Invalid read of size 1 ==23695== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==23695== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==23695== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==23695== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==23695== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==23695== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==23695== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==23695== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==23695== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==23695== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==23695== by 0x840F876: socket_event_poll_in (socket.c:1623) ==23695== by 0x840FC29: socket_event_handler (socket.c:1737) ==23695== Address 0xadeea68 is 0 bytes after a block of size 8 alloc'd ==23695== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==23695== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==23695== by 0x4C1A874: memdup (common-utils.h:292) ==23695== by 0x4C204BD: dict_unserialize (dict.c:2601) ==23695== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==23695== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==23695== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==23695== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==23695== by 0x840F876: socket_event_poll_in (socket.c:1623) ==23695== by 0x840FC29: socket_event_handler (socket.c:1737) ==23695== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==23695== by 0x4C54450: event_dispatch_epoll (event.c:876) (END)
from last night's run ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==6486== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==6486== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==6486== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==6486== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==6486== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==6486== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==6486== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==6486== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==6486== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726) ==6486== by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676) ==6486== by 0x716D6D1: afr_lookup_done (afr-common.c:732) ==6486== by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482) ==6486== by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xb28569b is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482) ==6486== by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xb28569a is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482) ==6486== by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xb285699 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160) ==6486== by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482) ==6486== by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xb285698 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592) ==6486== by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185) ==6486== by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277) ==6486== by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298) ==6486== by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== Address 0xb28569b is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592) ==6486== by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185) ==6486== by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277) ==6486== by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298) ==6486== by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== Address 0xb28569a is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592) ==6486== by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185) ==6486== by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277) ==6486== by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298) ==6486== by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== Address 0xb285699 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592) ==6486== by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185) ==6486== by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277) ==6486== by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298) ==6486== by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== Address 0xb285698 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beea is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663) ==6486== by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beea is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727) ==6486== by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08258: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08261: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0beea is 2 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A0826C: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== Invalid read of size 1 ==6486== at 0x4A08277: memcpy (mc_replace_strmem.c:402) ==6486== by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695) ==6486== by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584) ==6486== by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871) ==6486== by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd ==6486== at 0x4A0763E: malloc (vg_replace_malloc.c:207) ==6486== by 0x4C54D20: __gf_malloc (mem-pool.c:160) ==6486== by 0x4C1A874: memdup (common-utils.h:292) ==6486== by 0x4C204BD: dict_unserialize (dict.c:2601) ==6486== by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920) ==6486== by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757) ==6486== by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870) ==6486== by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043) ==6486== by 0x840F876: socket_event_poll_in (socket.c:1623) ==6486== by 0x840FC29: socket_event_handler (socket.c:1737) ==6486== by 0x4C54240: event_dispatch_epoll_handler (event.c:812) ==6486== by 0x4C54450: event_dispatch_epoll (event.c:876) ==6486== ==6486== ERROR SUMMARY: 4075561 errors from 55 contexts (suppressed: 36 from 2) ==6486== malloc/free: in use at exit: 24,301,104 bytes in 952 blocks. ==6486== malloc/free: 246,751,866 allocs, 246,750,914 frees, 54,153,314,422 bytes allocated. ==6486== For counts of detected errors, rerun with: -v ==6486== Use --track-origins=yes to see where uninitialised values come from ==6486== searching for pointers to 952 not-freed blocks. ==6486== checked 64,430,056 bytes.
Created attachment 652
(In reply to comment #3) > Created an attachment (id=652) [details] > afr valgrind logs Laxmi, are these happening on the 3.2.x and master?