==30370== Memcheck, a memory error detector ==30370== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al. ==30370== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info ==30370== Command: ceph-osd -i 2 --debug-osd 20 --debug-ms 1 ==30370== Parent PID: 30203 ==30370== ==30370== ==30370== HEAP SUMMARY: ==30370== in use at exit: 0 bytes in 0 blocks ==30370== total heap usage: 0 allocs, 0 frees, 0 bytes allocated ==30370== ==30370== All heap blocks were freed -- no leaks are possible ==30370== ==30370== For counts of detected and suppressed errors, rerun with: -v ==30370== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 4 from 4) ==30374== Syscall param setxattr(value) points to uninitialised byte(s) ==30374== at 0x663072A: setxattr (syscall-template.S:82) ==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143) ==30374== by 0x67273B: FileStore::_detect_fs() (FileStore.cc:1329) ==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669) ==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197) ==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257) ==30374== by 0x532BC8: main (ceph_osd.cc:389) ==30374== Address 0x7feffa2a0 is on thread 1's stack ==30374== ==30374== Syscall param setxattr(value) points to uninitialised byte(s) ==30374== at 0x663072A: setxattr (syscall-template.S:82) ==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143) ==30374== by 0x672757: FileStore::_detect_fs() (FileStore.cc:1330) ==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669) ==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197) ==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257) ==30374== by 0x532BC8: main (ceph_osd.cc:389) ==30374== Address 0x7feffa2a0 is on thread 1's stack ==30374== ==30374== Syscall param setxattr(value) points to uninitialised byte(s) ==30374== at 0x663072A: setxattr (syscall-template.S:82) ==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143) ==30374== by 0x672773: FileStore::_detect_fs() (FileStore.cc:1331) ==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669) ==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197) ==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257) ==30374== by 0x532BC8: main (ceph_osd.cc:389) ==30374== Address 0x7feffa2a0 is on thread 1's stack ==30374== ==30374== Syscall param setxattr(value) points to uninitialised byte(s) ==30374== at 0x663072A: setxattr (syscall-template.S:82) ==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143) ==30374== by 0x67278F: FileStore::_detect_fs() (FileStore.cc:1332) ==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669) ==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197) ==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257) ==30374== by 0x532BC8: main (ceph_osd.cc:389) ==30374== Address 0x7feffa2a0 is on thread 1's stack ==30374== ==30374== Syscall param setxattr(value) points to uninitialised byte(s) ==30374== at 0x663072A: setxattr (syscall-template.S:82) ==30374== by 0x66E6C7: do_setxattr(char const*, char const*, void const*, unsigned long) (FileStore.cc:143) ==30374== by 0x6727AB: FileStore::_detect_fs() (FileStore.cc:1333) ==30374== by 0x68EB31: FileStore::mount() (FileStore.cc:1669) ==30374== by 0x5B7529: do_convertfs(ObjectStore*) (OSD.cc:197) ==30374== by 0x5B8547: OSD::convertfs(std::string const&, std::string const&) (OSD.cc:257) ==30374== by 0x532BC8: main (ceph_osd.cc:389) ==30374== Address 0x7feffa2a0 is on thread 1's stack ==30374== ==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints ==30374== This could cause spurious value errors to appear. ==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper. ==30374== Thread 5: ==30374== Syscall param msync(start) points to unaddressable byte(s) ==30374== at 0x4C3184D: ??? (syscall-template.S:82) ==30374== by 0x68E6F40: ??? (in /usr/lib/libunwind.so.7.0.0) ==30374== by 0x68E7D43: _ULx86_64_step (in /usr/lib/libunwind.so.7.0.0) ==30374== by 0x5B7AE8B: GetStackTrace(void**, int, int) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B70497: tcmalloc::PageHeap::GrowHeap(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B70736: tcmalloc::PageHeap::New(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B7F0F6: malloc (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x65FE74A: __alloc_dir (opendir.c:186) ==30374== by 0x6F866A: leveldb::(anonymous namespace)::PosixEnv::GetChildren(std::string const&, std::vector >*) (in /usr/local/bin/ceph-osd) ==30374== by 0x6DA749: leveldb::DBImpl::DeleteObsoleteFiles() (in /usr/local/bin/ceph-osd) ==30374== by 0x6DCF74: leveldb::DBImpl::BackgroundCompaction() (in /usr/local/bin/ceph-osd) ==30374== by 0x6DDA07: leveldb::DBImpl::BackgroundCall() (in /usr/local/bin/ceph-osd) ==30374== Address 0x8afb000 is not stack'd, malloc'd or (recently) free'd ==30374== ==30374== Thread 62: ==30374== Syscall param msync(start) points to uninitialised byte(s) ==30374== at 0x4C3184D: ??? (syscall-template.S:82) ==30374== by 0x68E6F40: ??? (in /usr/lib/libunwind.so.7.0.0) ==30374== by 0x68E7D43: _ULx86_64_step (in /usr/lib/libunwind.so.7.0.0) ==30374== by 0x5B7AE8B: GetStackTrace(void**, int, int) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B70497: tcmalloc::PageHeap::GrowHeap(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B70736: tcmalloc::PageHeap::New(unsigned long) (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B61A7E: ??? (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x5B7DBEE: posix_memalign (in /usr/lib/libtcmalloc.so.0.1.0) ==30374== by 0x7AE149: ceph::buffer::create_page_aligned(unsigned int) (buffer.cc:139) ==30374== by 0x7868A6: SimpleMessenger::Pipe::read_message(Message**) (SimpleMessenger.cc:1850) ==30374== by 0x799488: SimpleMessenger::Pipe::reader() (SimpleMessenger.cc:1631) ==30374== by 0x75507C: SimpleMessenger::Pipe::Reader::entry() (SimpleMessenger.h:254) ==30374== Address 0x1c234000 is on thread 62's stack ==30374== ==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints ==30374== This could cause spurious value errors to appear. ==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper. ==30374== Warning: noted but unhandled ioctl 0x9408 with no size/direction hints ==30374== This could cause spurious value errors to appear. ==30374== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper.