Bug 811574 - memory corruption in the glusterfs process.
Summary: memory corruption in the glusterfs process.
Keywords:
Status: CLOSED DUPLICATE of bug 765201
Alias: None
Product: GlusterFS
Classification: Community
Component: core
Version: mainline
Hardware: x86_64
OS: Linux
high
high
Target Milestone: ---
Assignee: Raghavendra Bhat
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-04-11 13:06 UTC by Vijaykumar Koppad
Modified: 2014-08-25 00:49 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-05-18 12:48:43 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:


Attachments (Terms of Use)

Description Vijaykumar Koppad 2012-04-11 13:06:19 UTC
Description of problem:
This is the valgrind logs .. 
################################################################################
==4866== Invalid read of size 4
==4866==    at 0x60884C2: fuse_readdir_cbk (fuse-bridge.c:2317)
==4866==    by 0xA0165A0: io_stats_readdir_cbk (io-stats.c:1397)
==4866==    by 0x9E02692: mdc_readdirp_cbk (md-cache.c:1693)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x99DA3E8: ioc_readdirp_cbk (io-cache.c:1400)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x939DD0A: dht_readdirp_cbk (dht-common.c:2867)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==  Address 0xc83a778 is 168 bytes inside a block of size 171 alloc'd
==4866==    at 0x4A04A28: calloc (vg_replace_malloc.c:467)
==4866==    by 0x32290406EE: __gf_calloc (mem-pool.h:84)
==4866==    by 0x3229040E35: gf_dirent_for_name (gf-dirent.c:39)
==4866==    by 0x939D7B3: dht_readdirp_cbk (dht-common.c:2802)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==    by 0x322940AD46: rpc_transport_notify (rpc-transport.c:498)
==4866==    by 0x80ABC0E: socket_event_poll_in (socket.c:1686)
==4866==    by 0x80ABDB7: socket_event_handler (socket.c:1801)
==4866==    by 0x322903EFF0: event_dispatch_epoll (event.c:794)
==4866== 
==4866== Invalid read of size 4
==4866==    at 0x60884D8: fuse_readdir_cbk (fuse-bridge.c:2317)
==4866==    by 0xA0165A0: io_stats_readdir_cbk (io-stats.c:1397)
==4866==    by 0x9E02692: mdc_readdirp_cbk (md-cache.c:1693)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x99DA3E8: ioc_readdirp_cbk (io-cache.c:1400)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x322902404E: default_readdirp_cbk (defaults.c:440)
==4866==    by 0x939DD0A: dht_readdirp_cbk (dht-common.c:2867)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==  Address 0xd037590 is 176 bytes inside a block of size 177 alloc'd
==4866==    at 0x4A04A28: calloc (vg_replace_malloc.c:467)
==4866==    by 0x32290406EE: __gf_calloc (mem-pool.h:84)
==4866==    by 0x3229040E35: gf_dirent_for_name (gf-dirent.c:39)
==4866==    by 0x939D7B3: dht_readdirp_cbk (dht-common.c:2802)
==4866==    by 0x911A5E9: afr_readdirp_cbk (afr-dir-read.c:626)
==4866==    by 0x8EE8ADF: client3_1_readdirp_cbk (client3_1-fops.c:2301)
==4866==    by 0x322940F241: rpc_clnt_handle_reply (rpc-clnt.c:797)
==4866==    by 0x322940F455: rpc_clnt_notify (rpc-clnt.c:916)
==4866==    by 0x322940AD46: rpc_transport_notify (rpc-transport.c:498)
:

version : 3.3.0qa33

Comment 1 Vijay Bellur 2012-05-18 12:48:43 UTC

*** This bug has been marked as a duplicate of bug 765201 ***


Note You need to log in before you can comment on or make changes to this bug.