Bug 765244 (GLUSTER-3512) - nightly valgrind - Invalid read on client
Summary: nightly valgrind - Invalid read on client
Keywords:
Status: CLOSED UPSTREAM
Alias: GLUSTER-3512
Product: GlusterFS
Classification: Community
Component: replicate
Version: 3.1.7
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Pranith Kumar K
QA Contact: Shwetha Panduranga
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-09-05 15:57 UTC by Lakshmipathi G
Modified: 2012-05-29 09:47 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-05-29 09:47:43 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:


Attachments (Terms of Use)
fuse valgrind log (42.20 KB, text/x-log)
2011-09-05 12:58 UTC, Lakshmipathi G
no flags Details
afr valgrind logs (23.91 KB, application/x-bzip2)
2011-09-06 03:23 UTC, Lakshmipathi G
no flags Details

Description Lakshmipathi G 2011-09-05 12:58:03 UTC
Created attachment 651

Comment 1 Lakshmipathi G 2011-09-05 15:57:26 UTC
From nightly valgrind running with 3.1 branch (currently running this test again - will update its results by morning)
-------------
 Invalid read of size 1
==23695==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==23695==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==23695==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==23695==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==23695==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==23695==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==23695==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==23695==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==23695==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==23695==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==23695==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==23695==    by 0x840FC29: socket_event_handler (socket.c:1737)
==23695==  Address 0xadeea6b is 3 bytes after a block of size 8 alloc'd
==23695==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==23695==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==23695==    by 0x4C1A874: memdup (common-utils.h:292)
==23695==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==23695==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==23695==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==23695==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==23695==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==23695==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==23695==    by 0x840FC29: socket_event_handler (socket.c:1737)
==23695==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==23695==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==23695== 
==23695== Invalid read of size 1
==23695==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==23695==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==23695==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==23695==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==23695==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==23695==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==23695==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==23695==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==23695==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==23695==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==23695==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==23695==    by 0x840FC29: socket_event_handler (socket.c:1737)
==23695==  Address 0xadeea68 is 0 bytes after a block of size 8 alloc'd
==23695==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==23695==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==23695==    by 0x4C1A874: memdup (common-utils.h:292)
==23695==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==23695==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==23695==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==23695==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==23695==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==23695==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==23695==    by 0x840FC29: socket_event_handler (socket.c:1737)
==23695==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==23695==    by 0x4C54450: event_dispatch_epoll (event.c:876)
(END)

Comment 2 Lakshmipathi G 2011-09-06 03:22:15 UTC
from last night's run

==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716E371: afr_revalidate_lookup_cbk (afr-common.c:995)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==6486==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==6486==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==6486==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==  Address 0xa7439fb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==6486==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==6486==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==6486==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==  Address 0xa7439fa is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==6486==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==6486==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==6486==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==  Address 0xa7439f9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x7149917: afr_self_heal_find_sources (afr-self-heal-data.c:726)
==6486==    by 0x716D4E7: afr_lookup_set_read_child (afr-common.c:676)
==6486==    by 0x716D6D1: afr_lookup_done (afr-common.c:732)
==6486==    by 0x716E7B2: afr_revalidate_lookup_cbk (afr-common.c:1069)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==  Address 0xa7439f8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482)
==6486==    by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xb28569b is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482)
==6486==    by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xb28569a is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482)
==6486==    by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xb285699 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714BB1B: afr_sh_build_pending_matrix (afr-self-heal-common.c:160)
==6486==    by 0x71526B3: afr_sh_metadata_fix (afr-self-heal-metadata.c:482)
==6486==    by 0x7152EAA: afr_sh_metadata_lookup_cbk (afr-self-heal-metadata.c:606)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xb285698 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592)
==6486==    by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185)
==6486==    by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277)
==6486==    by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298)
==6486==    by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==  Address 0xb28569b is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592)
==6486==    by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185)
==6486==    by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277)
==6486==    by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298)
==6486==    by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==  Address 0xb28569a is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592)
==6486==    by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185)
==6486==    by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277)
==6486==    by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298)
==6486==    by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==  Address 0xb285699 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C714: afr_sh_pending_to_delta (afr-self-heal-common.c:592)
==6486==    by 0x7151089: afr_sh_metadata_erase_pending (afr-self-heal-metadata.c:185)
==6486==    by 0x71516DB: afr_sh_metadata_sync_cbk (afr-self-heal-metadata.c:277)
==6486==    by 0x715176F: afr_sh_metadata_xattr_cbk (afr-self-heal-metadata.c:298)
==6486==    by 0x6EFB29B: client3_1_setxattr_cbk (client3_1-fops.c:720)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==  Address 0xb285698 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beea is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714C9CF: afr_sh_has_metadata_pending (afr-self-heal-common.c:663)
==6486==    by 0x716CFB7: afr_lookup_collect_xattr (afr-common.c:571)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beea is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CB91: afr_sh_has_entry_pending (afr-self-heal-common.c:727)
==6486==    by 0x716D03A: afr_lookup_collect_xattr (afr-common.c:578)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08258: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beeb is 3 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08261: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0beea is 2 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A0826C: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee9 is 1 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== Invalid read of size 1
==6486==    at 0x4A08277: memcpy (mc_replace_strmem.c:402)
==6486==    by 0x714CAB0: afr_sh_has_data_pending (afr-self-heal-common.c:695)
==6486==    by 0x716D0BD: afr_lookup_collect_xattr (afr-common.c:584)
==6486==    by 0x716DD21: afr_fresh_lookup_cbk (afr-common.c:871)
==6486==    by 0x6EFFFD9: client3_1_lookup_cbk (client3_1-fops.c:1948)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486==  Address 0xae0bee8 is 0 bytes after a block of size 8 alloc'd
==6486==    at 0x4A0763E: malloc (vg_replace_malloc.c:207)
==6486==    by 0x4C54D20: __gf_malloc (mem-pool.c:160)
==6486==    by 0x4C1A874: memdup (common-utils.h:292)
==6486==    by 0x4C204BD: dict_unserialize (dict.c:2601)
==6486==    by 0x6EFFD3A: client3_1_lookup_cbk (client3_1-fops.c:1920)
==6486==    by 0x4E8CB5B: rpc_clnt_handle_reply (rpc-clnt.c:757)
==6486==    by 0x4E8CEBA: rpc_clnt_notify (rpc-clnt.c:870)
==6486==    by 0x4E8A45B: rpc_transport_notify (rpc-transport.c:1043)
==6486==    by 0x840F876: socket_event_poll_in (socket.c:1623)
==6486==    by 0x840FC29: socket_event_handler (socket.c:1737)
==6486==    by 0x4C54240: event_dispatch_epoll_handler (event.c:812)
==6486==    by 0x4C54450: event_dispatch_epoll (event.c:876)
==6486== 
==6486== ERROR SUMMARY: 4075561 errors from 55 contexts (suppressed: 36 from 2)
==6486== malloc/free: in use at exit: 24,301,104 bytes in 952 blocks.
==6486== malloc/free: 246,751,866 allocs, 246,750,914 frees, 54,153,314,422 bytes allocated.
==6486== For counts of detected errors, rerun with: -v
==6486== Use --track-origins=yes to see where uninitialised values come from
==6486== searching for pointers to 952 not-freed blocks.
==6486== checked 64,430,056 bytes.

Comment 3 Lakshmipathi G 2011-09-06 03:23:23 UTC
Created attachment 652

Comment 4 Pranith Kumar K 2011-09-21 01:20:28 UTC
(In reply to comment #3)
> Created an attachment (id=652) [details]
> afr valgrind logs

Laxmi, are these happening on the 3.2.x and master?


Note You need to log in before you can comment on or make changes to this bug.