|
valgrind --tool=memcheck rbd info huge2
|
|
==4530== Memcheck, a memory error detector
|
|
==4530== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
|
|
==4530== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
|
|
==4530== Command: rbd info huge2
|
|
==4530==
|
|
--4530-- WARNING: unhandled amd64-linux syscall: 324
|
|
--4530-- You may be able to write your own handler.
|
|
--4530-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
|
|
--4530-- Nevertheless we consider this a bug. Please report
|
|
--4530-- it at http://valgrind.org/support/bug_reports.html.
|
|
==4530== Conditional jump or move depends on uninitialised value(s)
|
|
==4530== at 0x299DEA: global_init(std::vector<char const*, std::allocator<char const*> >*, std::vector<char const*, std::allocator<char const*> >&, unsigned int, code_environment_t, int, char const*, bool) (global_init.cc:174)
|
|
==4530== by 0x187CD2: main (rbd.cc:17)
|
|
==4530==
|
|
==4530== Conditional jump or move depends on uninitialised value(s)
|
|
==4530== at 0x299DF8: global_init(std::vector<char const*, std::allocator<char const*> >*, std::vector<char const*, std::allocator<char const*> >&, unsigned int, code_environment_t, int, char const*, bool) (global_init.cc:178)
|
|
==4530== by 0x187CD2: main (rbd.cc:17)
|
|
==4530==
|
|
==4530== Conditional jump or move depends on uninitialised value(s)
|
|
==4530== at 0x299E2F: global_init(std::vector<char const*, std::allocator<char const*> >*, std::vector<char const*, std::allocator<char const*> >&, unsigned int, code_environment_t, int, char const*, bool) (global_init.cc:278)
|
|
==4530== by 0x187CD2: main (rbd.cc:17)
|
|
==4530==
|
|
2017-11-27 16:27:14.655318 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
2017-11-27 16:27:14.670145 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
2017-11-27 16:27:15.442146 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
2017-11-27 16:27:15.452767 4084380 -1 asok(0x113ba2e0) AdminSocketConfigObs::init: failed: AdminSocket::bind_and_listen: failed to bind the UNIX domain socket to '/tmp/ceph-asok.Dxb1L7/client.admin.4530.asok': (2) No such file or directory
|
|
2017-11-27 16:27:15.605008 4084380 1 RefCountedObject::put 0x123247a0 2 -> 1
|
|
2017-11-27 16:27:15.606452 4084380 1 RefCountedObject::put 0x123247a0 3 -> 2
|
|
2017-11-27 16:27:15.606722 4084380 1 RefCountedObject::put 0x123247a0 4 -> 3
|
|
2017-11-27 16:27:15.606964 4084380 1 RefCountedObject::put 0x123247a0 5 -> 4
|
|
vex amd64->IR: unhandled instruction bytes: 0xF 0xC7 0xF0 0x89 0x6 0xF 0x42 0xC1
|
|
vex amd64->IR: REX=0 REX.W=0 REX.R=0 REX.X=0 REX.B=0
|
|
vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=0F
|
|
vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0
|
|
==4530== valgrind: Unrecognised instruction at address 0xed2fb15.
|
|
==4530== at 0xED2FB15: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21)
|
|
==4530== by 0xED2FCB1: std::random_device::_M_getval() (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21)
|
|
==4530== by 0x59E16C8: operator() (random.h:1612)
|
|
==4530== by 0x59E16C8: MonClient::_add_conns(unsigned long) (MonClient.cc:658)
|
|
==4530== by 0x59E23EE: MonClient::_reopen_session(int) (MonClient.cc:600)
|
|
==4530== by 0x59E3737: MonClient::authenticate(double) (MonClient.cc:456)
|
|
==4530== by 0x5428F93: librados::RadosClient::connect() (RadosClient.cc:299)
|
|
==4530== by 0x1C3DD0: rbd::utils::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, librados::Rados*, librados::IoCtx*) (Utils.cc:861)
|
|
==4530== by 0x1C3E63: rbd::utils::init_and_open_image(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool, librados::Rados*, librados::IoCtx*, librbd::Image*) (Utils.cc:934)
|
|
==4530== by 0x1F1EA8: rbd::action::info::execute(boost::program_options::variables_map const&) (Info.cc:365)
|
|
==4530== by 0x1BDB5F: rbd::Shell::execute(std::vector<char const*, std::allocator<char const*> > const&) (Shell.cc:151)
|
|
==4530== by 0x187CE0: main (rbd.cc:20)
|
|
==4530== Your program just tried to execute an instruction that Valgrind
|
|
==4530== did not recognise. There are two possible reasons for this.
|
|
==4530== 1. Your program has a bug and erroneously jumped to a non-code
|
|
==4530== location. If you are running Memcheck and you just saw a
|
|
==4530== warning about a bad jump, it's probably your program's fault.
|
|
==4530== 2. The instruction is legitimate but Valgrind doesn't handle it,
|
|
==4530== i.e. it's Valgrind's fault. If you think this is the case or
|
|
==4530== you are not sure, please let us know and we'll try to fix it.
|
|
==4530== Either way, Valgrind will now raise a SIGILL signal which will
|
|
==4530== probably kill your program.
|
|
*** Caught signal (Illegal instruction) **
|
|
in thread 4084380 thread_name:memcheck-amd64-
|
|
ceph version 12.2.0-1124-g5e519ae (5e519aebe718bd16d52e974beba8e3bf97b04ae8) luminous (stable)
|
|
1: (()+0x195f44) [0x29df44]
|
|
2: (()+0x11390) [0xe664390]
|
|
3: (()+0xb7b15) [0xed2fb15]
|
|
4: (std::random_device::_M_getval()+0x92) [0xed2fcb2]
|
|
5: (MonClient::_add_conns(unsigned long)+0x1a9) [0x59e16c9]
|
|
6: (MonClient::_reopen_session(int)+0x45f) [0x59e23ef]
|
|
7: (MonClient::authenticate(double)+0x268) [0x59e3738]
|
|
8: (librados::RadosClient::connect()+0x754) [0x5428f94]
|
|
9: (rbd::utils::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, librados::Rados*, librados::IoCtx*)+0x41) [0x1c3dd1]
|
|
10: (rbd::utils::init_and_open_image(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool, librados::Rados*, librados::IoCtx*, librbd::Image*)+0x24) [0x1c3e64]
|
|
11: (rbd::action::info::execute(boost::program_options::variables_map const&)+0x389) [0x1f1ea9]
|
|
12: (rbd::Shell::execute(std::vector<char const*, std::allocator<char const*> > const&)+0xa30) [0x1bdb60]
|
|
13: (main()+0x71) [0x187ce1]
|
|
14: (__libc_start_main()+0xf0) [0xf539830]
|
|
15: (_start()+0x29) [0x1a6639]
|
|
2017-11-27 16:27:15.854667 4084380 -1 *** Caught signal (Illegal instruction) **
|
|
in thread 4084380 thread_name:memcheck-amd64-
|
|
|
|
ceph version 12.2.0-1124-g5e519ae (5e519aebe718bd16d52e974beba8e3bf97b04ae8) luminous (stable)
|
|
1: (()+0x195f44) [0x29df44]
|
|
2: (()+0x11390) [0xe664390]
|
|
3: (()+0xb7b15) [0xed2fb15]
|
|
4: (std::random_device::_M_getval()+0x92) [0xed2fcb2]
|
|
5: (MonClient::_add_conns(unsigned long)+0x1a9) [0x59e16c9]
|
|
6: (MonClient::_reopen_session(int)+0x45f) [0x59e23ef]
|
|
7: (MonClient::authenticate(double)+0x268) [0x59e3738]
|
|
8: (librados::RadosClient::connect()+0x754) [0x5428f94]
|
|
9: (rbd::utils::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, librados::Rados*, librados::IoCtx*)+0x41) [0x1c3dd1]
|
|
10: (rbd::utils::init_and_open_image(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool, librados::Rados*, librados::IoCtx*, librbd::Image*)+0x24) [0x1c3e64]
|
|
11: (rbd::action::info::execute(boost::program_options::variables_map const&)+0x389) [0x1f1ea9]
|
|
12: (rbd::Shell::execute(std::vector<char const*, std::allocator<char const*> > const&)+0xa30) [0x1bdb60]
|
|
13: (main()+0x71) [0x187ce1]
|
|
14: (__libc_start_main()+0xf0) [0xf539830]
|
|
15: (_start()+0x29) [0x1a6639]
|
|
NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this.
|
|
|
|
--- begin dump of recent events ---
|
|
-66> 2017-11-27 16:27:14.246493 4084380 5 asok(0x113ba2e0) register_command perfcounters_dump hook 0x114e88c0
|
|
-65> 2017-11-27 16:27:14.259091 4084380 5 asok(0x113ba2e0) register_command 1 hook 0x114e88c0
|
|
-64> 2017-11-27 16:27:14.263015 4084380 5 asok(0x113ba2e0) register_command perf dump hook 0x114e88c0
|
|
-63> 2017-11-27 16:27:14.265415 4084380 5 asok(0x113ba2e0) register_command perfcounters_schema hook 0x114e88c0
|
|
-62> 2017-11-27 16:27:14.266877 4084380 5 asok(0x113ba2e0) register_command perf histogram dump hook 0x114e88c0
|
|
-61> 2017-11-27 16:27:14.267739 4084380 5 asok(0x113ba2e0) register_command 2 hook 0x114e88c0
|
|
-60> 2017-11-27 16:27:14.268473 4084380 5 asok(0x113ba2e0) register_command perf schema hook 0x114e88c0
|
|
-59> 2017-11-27 16:27:14.269402 4084380 5 asok(0x113ba2e0) register_command perf histogram schema hook 0x114e88c0
|
|
-58> 2017-11-27 16:27:14.270281 4084380 5 asok(0x113ba2e0) register_command perf reset hook 0x114e88c0
|
|
-57> 2017-11-27 16:27:14.271236 4084380 5 asok(0x113ba2e0) register_command config show hook 0x114e88c0
|
|
-56> 2017-11-27 16:27:14.272197 4084380 5 asok(0x113ba2e0) register_command config help hook 0x114e88c0
|
|
-55> 2017-11-27 16:27:14.273033 4084380 5 asok(0x113ba2e0) register_command config set hook 0x114e88c0
|
|
-54> 2017-11-27 16:27:14.273922 4084380 5 asok(0x113ba2e0) register_command config get hook 0x114e88c0
|
|
-53> 2017-11-27 16:27:14.274833 4084380 5 asok(0x113ba2e0) register_command config diff hook 0x114e88c0
|
|
-52> 2017-11-27 16:27:14.275837 4084380 5 asok(0x113ba2e0) register_command config diff get hook 0x114e88c0
|
|
-51> 2017-11-27 16:27:14.277445 4084380 5 asok(0x113ba2e0) register_command log flush hook 0x114e88c0
|
|
-50> 2017-11-27 16:27:14.278296 4084380 5 asok(0x113ba2e0) register_command log dump hook 0x114e88c0
|
|
-49> 2017-11-27 16:27:14.279251 4084380 5 asok(0x113ba2e0) register_command log reopen hook 0x114e88c0
|
|
-48> 2017-11-27 16:27:14.281226 4084380 5 asok(0x113ba2e0) register_command dump_mempools hook 0x114edb78
|
|
-47> 2017-11-27 16:27:14.655318 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
-46> 2017-11-27 16:27:14.657878 4084380 1 lockdep start
|
|
-45> 2017-11-27 16:27:14.670145 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
-44> 2017-11-27 16:27:15.432196 4084380 1 lockdep using id 0
|
|
-43> 2017-11-27 16:27:15.442146 4084380 -1 WARNING: all dangerous and experimental features are enabled.
|
|
-42> 2017-11-27 16:27:15.442878 4084380 5 asok(0x113ba2e0) init /tmp/ceph-asok.Dxb1L7/client.admin.4530.asok
|
|
-41> 2017-11-27 16:27:15.445583 4084380 5 asok(0x113ba2e0) bind_and_listen /tmp/ceph-asok.Dxb1L7/client.admin.4530.asok
|
|
-40> 2017-11-27 16:27:15.452767 4084380 -1 asok(0x113ba2e0) AdminSocketConfigObs::init: failed: AdminSocket::bind_and_listen: failed to bind the UNIX domain socket to '/tmp/ceph-asok.Dxb1L7/client.admin.4530.asok': (2) No such file or directory
|
|
-39> 2017-11-27 16:27:15.458623 4084380 1 lockdep using id 1
|
|
-38> 2017-11-27 16:27:15.478448 4084380 1 lockdep using id 2
|
|
-37> 2017-11-27 16:27:15.479815 4084380 1 lockdep using id 3
|
|
-36> 2017-11-27 16:27:15.483763 4084380 1 lockdep using id 4
|
|
-35> 2017-11-27 16:27:15.485496 4084380 1 lockdep using id 5
|
|
-34> 2017-11-27 16:27:15.487371 4084380 1 lockdep using id 6
|
|
-33> 2017-11-27 16:27:15.490544 4084380 1 lockdep using id 7
|
|
-32> 2017-11-27 16:27:15.495518 4084380 1 lockdep using id 8
|
|
-31> 2017-11-27 16:27:15.503872 4084380 10 monclient: build_initial_monmap
|
|
-30> 2017-11-27 16:27:15.543405 4084380 1 lockdep using id 9
|
|
-29> 2017-11-27 16:27:15.544118 4084380 1 lockdep using id 10
|
|
-28> 2017-11-27 16:27:15.545858 4084380 1 lockdep using id 11
|
|
-27> 2017-11-27 16:27:15.548259 4084380 1 lockdep using id 12
|
|
-26> 2017-11-27 16:27:15.549298 4084380 1 lockdep using id 13
|
|
-25> 2017-11-27 16:27:15.557757 4084380 1 lockdep using id 14
|
|
-24> 2017-11-27 16:27:15.558622 4084380 1 lockdep using id 15
|
|
-23> 2017-11-27 16:27:15.567520 4084380 1 lockdep using id 16
|
|
-22> 2017-11-27 16:27:15.574926 4084380 1 lockdep using id 17
|
|
-21> 2017-11-27 16:27:15.576001 4084380 1 lockdep using id 18
|
|
-20> 2017-11-27 16:27:15.600767 4084380 1 lockdep using id 19
|
|
-19> 2017-11-27 16:27:15.605008 4084380 1 RefCountedObject::put 0x123247a0 2 -> 1
|
|
-18> 2017-11-27 16:27:15.606452 4084380 1 RefCountedObject::put 0x123247a0 3 -> 2
|
|
-17> 2017-11-27 16:27:15.606722 4084380 1 RefCountedObject::put 0x123247a0 4 -> 3
|
|
-16> 2017-11-27 16:27:15.606964 4084380 1 RefCountedObject::put 0x123247a0 5 -> 4
|
|
-15> 2017-11-27 16:27:15.612416 4084380 1 librados: starting msgr at -
|
|
-14> 2017-11-27 16:27:15.613941 4084380 1 librados: starting objecter
|
|
-13> 2017-11-27 16:27:15.629798 4084380 1 lockdep using id 20
|
|
-12> 2017-11-27 16:27:15.630540 4084380 1 lockdep using id 21
|
|
-11> 2017-11-27 16:27:15.633191 4084380 1 lockdep using id 22
|
|
-10> 2017-11-27 16:27:15.639517 4084380 1 lockdep using id 23
|
|
-9> 2017-11-27 16:27:15.639600 4084380 5 asok(0x113ba2e0) register_command objecter_requests hook 0x12336530
|
|
-8> 2017-11-27 16:27:15.659516 4084380 1 librados: setting wanted keys
|
|
-7> 2017-11-27 16:27:15.660259 4084380 1 librados: calling monclient init
|
|
-6> 2017-11-27 16:27:15.661081 4084380 10 monclient: init
|
|
-5> 2017-11-27 16:27:15.663563 4084380 5 adding auth protocol: cephx
|
|
-4> 2017-11-27 16:27:15.664887 4084380 10 monclient: auth_supported 2 method cephx
|
|
-3> 2017-11-27 16:27:15.760761 4084380 2 auth: KeyRing::load: loaded key file /home/sebastian/Repos/ceph/build/keyring
|
|
-2> 2017-11-27 16:27:15.762651 4084380 1 lockdep using id 24
|
|
-1> 2017-11-27 16:27:15.782043 4084380 10 monclient: _reopen_session rank -1
|
|
0> 2017-11-27 16:27:15.854667 4084380 -1 *** Caught signal (Illegal instruction) **
|
|
in thread 4084380 thread_name:memcheck-amd64-
|
|
|
|
ceph version 12.2.0-1124-g5e519ae (5e519aebe718bd16d52e974beba8e3bf97b04ae8) luminous (stable)
|
|
1: (()+0x195f44) [0x29df44]
|
|
2: (()+0x11390) [0xe664390]
|
|
3: (()+0xb7b15) [0xed2fb15]
|
|
4: (std::random_device::_M_getval()+0x92) [0xed2fcb2]
|
|
5: (MonClient::_add_conns(unsigned long)+0x1a9) [0x59e16c9]
|
|
6: (MonClient::_reopen_session(int)+0x45f) [0x59e23ef]
|
|
7: (MonClient::authenticate(double)+0x268) [0x59e3738]
|
|
8: (librados::RadosClient::connect()+0x754) [0x5428f94]
|
|
9: (rbd::utils::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, librados::Rados*, librados::IoCtx*)+0x41) [0x1c3dd1]
|
|
10: (rbd::utils::init_and_open_image(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool, librados::Rados*, librados::IoCtx*, librbd::Image*)+0x24) [0x1c3e64]
|
|
11: (rbd::action::info::execute(boost::program_options::variables_map const&)+0x389) [0x1f1ea9]
|
|
12: (rbd::Shell::execute(std::vector<char const*, std::allocator<char const*> > const&)+0xa30) [0x1bdb60]
|
|
13: (main()+0x71) [0x187ce1]
|
|
14: (__libc_start_main()+0xf0) [0xf539830]
|
|
15: (_start()+0x29) [0x1a6639]
|
|
NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this.
|
|
|
|
--- logging levels ---
|
|
0/ 5 none
|
|
0/ 1 lockdep
|
|
0/ 1 context
|
|
1/ 1 crush
|
|
1/ 5 mds
|
|
1/ 5 mds_balancer
|
|
1/ 5 mds_locker
|
|
1/ 5 mds_log
|
|
1/ 5 mds_log_expire
|
|
1/ 5 mds_migrator
|
|
0/ 1 buffer
|
|
0/ 1 timer
|
|
0/ 1 filer
|
|
0/ 1 striper
|
|
0/ 1 objecter
|
|
0/ 5 rados
|
|
0/ 5 rbd
|
|
0/ 5 rbd_mirror
|
|
0/ 5 rbd_replay
|
|
0/ 5 journaler
|
|
0/ 5 objectcacher
|
|
0/ 5 client
|
|
1/ 5 osd
|
|
0/ 5 optracker
|
|
0/ 5 objclass
|
|
1/ 3 filestore
|
|
1/ 3 journal
|
|
0/ 0 ms
|
|
1/ 5 mon
|
|
0/10 monc
|
|
1/ 5 paxos
|
|
0/ 5 tp
|
|
1/ 5 auth
|
|
1/ 5 crypto
|
|
1/ 1 finisher
|
|
1/ 1 reserver
|
|
1/ 5 heartbeatmap
|
|
1/ 5 perfcounter
|
|
1/ 5 rgw
|
|
1/10 civetweb
|
|
1/ 5 javaclient
|
|
1/ 5 asok
|
|
1/ 1 throttle
|
|
0/ 0 refs
|
|
1/ 5 xio
|
|
1/ 5 compressor
|
|
1/ 5 bluestore
|
|
1/ 5 bluefs
|
|
1/ 3 bdev
|
|
1/ 5 kstore
|
|
4/ 5 rocksdb
|
|
4/ 5 leveldb
|
|
4/ 5 memdb
|
|
1/ 5 kinetic
|
|
1/ 5 fuse
|
|
1/ 5 mgr
|
|
1/ 5 mgrc
|
|
1/ 5 dpdk
|
|
1/ 5 eventtrace
|
|
-2/-2 (syslog threshold)
|
|
99/99 (stderr threshold)
|
|
max_recent 500
|
|
max_new 1000
|
|
log_file /home/sebastian/Repos/ceph/build/out/client.admin.4530.log
|
|
--- end dump of recent events ---
|
|
==4530==
|
|
==4530== Process terminating with default action of signal 4 (SIGILL)
|
|
==4530== at 0xE664269: raise (pt-raise.c:35)
|
|
==4530== by 0x29DFCD: reraise_fatal (signal_handler.cc:74)
|
|
==4530== by 0x29DFCD: handle_fatal_signal(int) (signal_handler.cc:138)
|
|
==4530== by 0xE66438F: ??? (in /lib/x86_64-linux-gnu/libpthread-2.23.so)
|
|
==4530== by 0xED2FB14: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21)
|
|
==4530== by 0xED2FCB1: std::random_device::_M_getval() (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21)
|
|
==4530== by 0x59E16C8: operator() (random.h:1612)
|
|
==4530== by 0x59E16C8: MonClient::_add_conns(unsigned long) (MonClient.cc:658)
|
|
==4530== by 0x59E23EE: MonClient::_reopen_session(int) (MonClient.cc:600)
|
|
==4530== by 0x59E3737: MonClient::authenticate(double) (MonClient.cc:456)
|
|
==4530== by 0x5428F93: librados::RadosClient::connect() (RadosClient.cc:299)
|
|
==4530== by 0x1C3DD0: rbd::utils::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, librados::Rados*, librados::IoCtx*) (Utils.cc:861)
|
|
==4530== by 0x1C3E63: rbd::utils::init_and_open_image(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool, librados::Rados*, librados::IoCtx*, librbd::Image*) (Utils.cc:934)
|
|
==4530== by 0x1F1EA8: rbd::action::info::execute(boost::program_options::variables_map const&) (Info.cc:365)
|
|
==4530==
|
|
==4530== HEAP SUMMARY:
|
|
==4530== in use at exit: 2,525,061 bytes in 13,918 blocks
|
|
==4530== total heap usage: 35,471 allocs, 21,553 frees, 3,905,281 bytes allocated
|
|
==4530==
|
|
==4530== LEAK SUMMARY:
|
|
==4530== definitely lost: 0 bytes in 0 blocks
|
|
==4530== indirectly lost: 0 bytes in 0 blocks
|
|
==4530== possibly lost: 68,191 bytes in 132 blocks
|
|
==4530== still reachable: 2,456,870 bytes in 13,786 blocks
|
|
==4530== suppressed: 0 bytes in 0 blocks
|
|
==4530== Rerun with --leak-check=full to see details of leaked memory
|
|
==4530==
|
|
==4530== For counts of detected and suppressed errors, rerun with: -v
|
|
==4530== Use --track-origins=yes to see where uninitialised values come from
|
|
==4530== ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
|
[1] 4530 killed valgrind --tool=memcheck rbd info huge2
|