Actions
Bug #12429
closedOSD crash creating/deleting pools
Status:
Resolved
Priority:
High
Assignee:
-
Category:
OSD
Target version:
-
% Done:
0%
Source:
other
Tags:
Backport:
hammer,firefly
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
While working on cephfs tests that aggressively create/delete pools, saw this crash on master:
268619 -269> 2015-07-22 12:21:39.232780 7f4275ffd700 -1 ./osd/OSDMap.h: In function 'const string& OSDMap::get_pool_name(int64_t) const' thread 7f4275ffd700 time 2015-07-22 12:21:39.215478 268620 ./osd/OSDMap.h: 724: FAILED assert(i != pool_name.end()) 268621 268622 ceph version 9.0.2-755-g44464f9 (44464f9c689bcbf961521ff6053d0a431be06b75) 268623 1: (ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x80) [0x1aef453] 268624 2: (OSDMap::get_pool_name(long) const+0x7a) [0x14342d0] 268625 3: (PGPool::update(std::tr1::shared_ptr<OSDMap const>)+0xbf) [0x163c8b5] 268626 4: (PG::handle_advance_map(std::tr1::shared_ptr<OSDMap const>, std::tr1::shared_ptr<OSDMap const>, std::vector<int, std::allocator<int> >&, int, std::vector<int, std::allocator<int> >&, int, PG::RecoveryC tx*)+0x297) [0x16674db] 268627 5: (OSD::advance_pg(unsigned int, PG*, ThreadPool::TPHandle&, PG::RecoveryCtx*, std::set<boost::intrusive_ptr<PG>, std::less<boost::intrusive_ptr<PG> >, std::allocator<boost::intrusive_ptr<PG> > >*)+0x418 ) [0x140e8b6] 268628 6: (OSD::process_peering_events(std::list<PG*, std::allocator<PG*> > const&, ThreadPool::TPHandle&)+0x19a) [0x141f916] 268629 7: (OSD::PeeringWQ::_process(std::list<PG*, std::allocator<PG*> > const&, ThreadPool::TPHandle&)+0x30) [0x143ca00] 268630 8: (ThreadPool::BatchWorkQueue<PG>::_void_process(void*, ThreadPool::TPHandle&)+0x33) [0x14e188d] 268631 9: (ThreadPool::worker(ThreadPool::WorkThread*)+0x70b) [0x1adf45d] 268632 10: (ThreadPool::WorkThread::entry()+0x23) [0x1ae3413] 268633 11: (Thread::entry_wrapper()+0xa8) [0x1ad78b4] 268634 12: (Thread::_entry_func(void*)+0x18) [0x1ad7802] 268635 13: (()+0x7555) [0x7f4292706555] 268636 14: (clone()+0x6d) [0x7f4290f21f3d] 268637 NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this. 268638
Files
Actions