Project

General

Profile

Actions

Bug #59867

open

crash: syscall()

Added by Telemetry Bot 12 months ago. Updated 12 months ago.

Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):

42991943731a0e005dd40b48cfda372a5d4c68086781b1ee2e17850964031030


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=bea75efcace465c1f92ae0ab03dabb0ff417be1405f6a10124d8a632baaad923

Sanitized backtrace:

    syscall()
    base::internal::SpinLockWake(int volatile*, bool)
    tcmalloc::CentralFreeList::InsertRange(void*, void*, int)
    tcmalloc::ThreadCache::ReleaseToCentralCache(tcmalloc::ThreadCache::FreeList*, unsigned int, int)
    tcmalloc::ThreadCache::ListTooLong(tcmalloc::ThreadCache::FreeList*, unsigned int)
    ClassHandler::ClassMethod::exec(void*, ceph::buffer::list&, ceph::buffer::list&)
    PrimaryLogPG::do_osd_ops(PrimaryLogPG::OpContext*, std::vector<OSDOp, std::allocator<OSDOp> >&)
    PrimaryLogPG::prepare_transaction(PrimaryLogPG::OpContext*)
    PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)
    PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "archived": "2022-10-23 09:12:11.584226",
    "backtrace": [
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x13140) [0x7f8392565140]",
        "syscall()",
        "(base::internal::SpinLockWake(int volatile*, bool)+0x3f) [0x7f83928f621f]",
        "(tcmalloc::CentralFreeList::InsertRange(void*, void*, int)+0x85) [0x7f83928e6aa5]",
        "(tcmalloc::ThreadCache::ReleaseToCentralCache(tcmalloc::ThreadCache::FreeList*, unsigned int, int)+0x12a) [0x7f83928eaa5a]",
        "(tcmalloc::ThreadCache::ListTooLong(tcmalloc::ThreadCache::FreeList*, unsigned int)+0x2c) [0x7f83928eadbc]",
        "/usr/lib/rados-classes/libcls_rgw_gc.so(+0x1a111) [0x7f8385b85111]",
        "/usr/lib/rados-classes/libcls_rgw_gc.so(+0x109f9) [0x7f8385b7b9f9]",
        "/usr/bin/ceph-osd(+0xd7a919) [0x55e62d404919]",
        "(ClassHandler::ClassMethod::exec(void*, ceph::buffer::v15_2_0::list&, ceph::buffer::v15_2_0::list&)+0x59) [0x55e62d405209]",
        "(PrimaryLogPG::do_osd_ops(PrimaryLogPG::OpContext*, std::vector<OSDOp, std::allocator<OSDOp> >&)+0x79b) [0x55e62d4dca2b]",
        "(PrimaryLogPG::prepare_transaction(PrimaryLogPG::OpContext*)+0x9f) [0x55e62d4ef32f]",
        "(PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)+0x30d) [0x55e62d4f135d]",
        "(PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)+0x390b) [0x55e62d4f9e4b]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x19b) [0x55e62d36397b]",
        "(ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x69) [0x55e62d631d89]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xad0) [0x55e62d397bc0]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x55e62da7ac1a]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x55e62da7d1f0]",
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x7ea7) [0x7f8392559ea7]",
        "clone()" 
    ],
    "ceph_version": "17.2.5",
    "crash_id": "2022-10-23T04:38:57.466014Z_2b8081e4-13c4-4324-9d3c-46e006ae2203",
    "entity_name": "osd.fbf85626dc400fa09640ed55b7d62ad290828ad0",
    "os_id": "11",
    "os_name": "Debian GNU/Linux 11 (bullseye)",
    "os_version": "11 (bullseye)",
    "os_version_id": "11",
    "process_name": "ceph-osd",
    "stack_sig": "42991943731a0e005dd40b48cfda372a5d4c68086781b1ee2e17850964031030",
    "timestamp": "2022-10-23T04:38:57.466014Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.10.0-19-amd64",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP Debian 5.10.149-1 (2022-10-17)" 
}

Actions #1

Updated by Telemetry Bot 12 months ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v17.2.5 added
Actions

Also available in: Atom PDF