Project

General

Profile

Bug #2454 » valgrind.log

Simon Frerichs, 05/30/2012 09:37 AM

 
==30370== Memcheck, a memory error detector
==30370== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al.
==30370== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info
==30370== Command: ceph-osd -i 2 --debug-osd 20 --debug-ms 1
==30370== Parent PID: 30203
==30370==
==30370==
==30370== HEAP SUMMARY:
==30370== in use at exit: 0 bytes in 0 blocks
==30370== total heap usage: 0 allocs, 0 frees, 0 bytes allocated
==30370==
==30370== All heap blocks were freed -- no leaks are possible
==30370==
==30370== For counts of detected and suppressed errors, rerun with: -v
==30370== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 4 from 4)
==30374== Syscall param setxattr(value) points to uninitialised byte(s)
==30374== at 0x663072A: setxattr (syscall-template.S:82)
==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143)
==30374== by 0x67273B: FileStore::_detect_fs() (FileStore.cc:1329)
==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669)
==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197)
==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257)
==30374== by 0x532BC8: main (ceph_osd.cc:389)
==30374== Address 0x7feffa2a0 is on thread 1's stack
==30374==
==30374== Syscall param setxattr(value) points to uninitialised byte(s)
==30374== at 0x663072A: setxattr (syscall-template.S:82)
==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143)
==30374== by 0x672757: FileStore::_detect_fs() (FileStore.cc:1330)
==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669)
==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197)
==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257)
==30374== by 0x532BC8: main (ceph_osd.cc:389)
==30374== Address 0x7feffa2a0 is on thread 1's stack
==30374==
==30374== Syscall param setxattr(value) points to uninitialised byte(s)
==30374== at 0x663072A: setxattr (syscall-template.S:82)
==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143)
==30374== by 0x672773: FileStore::_detect_fs() (FileStore.cc:1331)
==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669)
==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197)
==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257)
==30374== by 0x532BC8: main (ceph_osd.cc:389)
==30374== Address 0x7feffa2a0 is on thread 1's stack
==30374==
==30374== Syscall param setxattr(value) points to uninitialised byte(s)
==30374== at 0x663072A: setxattr (syscall-template.S:82)
==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143)
==30374== by 0x67278F: FileStore::_detect_fs() (FileStore.cc:1332)
==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669)
==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197)
==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257)
==30374== by 0x532BC8: main (ceph_osd.cc:389)
==30374== Address 0x7feffa2a0 is on thread 1's stack
==30374==
==30374== Syscall param setxattr(value) points to uninitialised byte(s)
==30374== at 0x663072A: setxattr (syscall-template.S:82)
==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143)
==30374== by 0x6727AB: FileStore::_detect_fs() (FileStore.cc:1333)
==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669)
==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197)
==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257)
==30374== by 0x532BC8: main (ceph_osd.cc:389)
==30374== Address 0x7feffa2a0 is on thread 1's stack
==30374==
==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints
==30374== This could cause spurious value errors to appear.
==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.
==30374== Thread 5:
==30374== Syscall param msync(start) points to unaddressable byte(s)
==30374== at 0x4C3184D: ??? (syscall-template.S:82)
==30374== by 0x68E6F40: ??? (in /usr/lib/libunwind.so.7.0.0)
==30374== by 0x68E7D43: _ULx86_64_step (in /usr/lib/libunwind.so.7.0.0)
==30374== by 0x5B7AE8B: GetStackTrace(void**, int, int) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B70497: tcmalloc::PageHeap::GrowHeap(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B70736: tcmalloc::PageHeap::New(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B7F0F6: malloc (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x65FE74A: __alloc_dir (opendir.c:186)
==30374== by 0x6F866A: leveldb::(anonymous namespace)::PosixEnv::GetChildren(std::string const&, std::vector<std::string, std::allocator<std::string> >*) (in /usr/local/bin/ceph-osd)
==30374== by 0x6DA749: leveldb::DBImpl::DeleteObsoleteFiles() (in /usr/local/bin/ceph-osd)
==30374== by 0x6DCF74: leveldb::DBImpl::BackgroundCompaction() (in /usr/local/bin/ceph-osd)
==30374== by 0x6DDA07: leveldb::DBImpl::BackgroundCall() (in /usr/local/bin/ceph-osd)
==30374== Address 0x8afb000 is not stack'd, malloc'd or (recently) free'd
==30374==
==30374== Thread 62:
==30374== Syscall param msync(start) points to uninitialised byte(s)
==30374== at 0x4C3184D: ??? (syscall-template.S:82)
==30374== by 0x68E6F40: ??? (in /usr/lib/libunwind.so.7.0.0)
==30374== by 0x68E7D43: _ULx86_64_step (in /usr/lib/libunwind.so.7.0.0)
==30374== by 0x5B7AE8B: GetStackTrace(void**, int, int) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B70497: tcmalloc::PageHeap::GrowHeap(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B70736: tcmalloc::PageHeap::New(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B61A7E: ??? (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x5B7DBEE: posix_memalign (in /usr/lib/libtcmalloc.so.0.1.0)
==30374== by 0x7AE149: ceph::buffer::create_page_aligned(unsigned int) (buffer.cc:139)
==30374== by 0x7868A6: SimpleMessenger::Pipe::read_message(Message**) (SimpleMessenger.cc:1850)
==30374== by 0x799488: SimpleMessenger::Pipe::reader() (SimpleMessenger.cc:1631)
==30374== by 0x75507C: SimpleMessenger::Pipe::Reader::entry() (SimpleMessenger.h:254)
==30374== Address 0x1c234000 is on thread 62's stack
==30374==
==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints
==30374== This could cause spurious value errors to appear.
==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.
==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints
==30374== This could cause spurious value errors to appear.
==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.
(10-10/14)