Project

General

Profile

Actions

Bug #42456

closed

segfault Radoswriter

Added by Anonymous over 4 years ago. Updated over 4 years ago.

Status:
Duplicate
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
Community (user)
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

   -24> 2019-10-22 02:54:50.120 7fd6a80b3700  1 ====== starting new request req=0x55ae19d8a940 =====
   -23> 2019-10-22 02:54:50.120 7fd6a80b3700  2 req 161647 0.000s initializing for trans_id = tx00000000000000002776f-005dae535a-69d3b-default
   -22> 2019-10-22 02:54:50.120 7fd6a80b3700  2 req 161647 0.000s getting op 1
   -21> 2019-10-22 02:54:50.120 7fd6a80b3700  2 req 161647 0.000s s3:put_obj verifying requester
   -20> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj normalizing buckets and tenants
   -19> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj init permissions
   -18> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj recalculating target
   -17> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj reading permissions
   -16> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj init op
   -15> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj verifying op mask
   -14> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj verifying op permissions
   -13> 2019-10-22 02:54:50.124 7fd6a80b3700  5 req 161647 0.004s s3:put_obj Searching permissions for identity=rgw::auth::SysReqApplier -> rgw::auth::LocalApplier(acct_user=gitlab-runner, acct_name=Gitlab Runner, subuser=, perm_mask=15, is_admin=0) mask=50
   -12> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Searching permissions for uid=gitlab-runner
   -11> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Found permission: 15
   -10> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Searching permissions for group=1 mask=50
    -9> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Permissions for group not found
    -8> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Searching permissions for group=2 mask=50
    -7> 2019-10-22 02:54:50.124 7fd6a80b3700  5 Permissions for group not found
    -6> 2019-10-22 02:54:50.124 7fd6a80b3700  5 req 161647 0.004s s3:put_obj -- Getting permissions done for identity=rgw::auth::SysReqApplier -> rgw::auth::LocalApplier(acct_user=gitlab-runner, acct_name=Gitlab Runner, subuser=, perm_mask=15, is_admin=0), owner=gitlab-runner, perm=2
    -5> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj verifying op params
    -4> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj pre-executing
    -3> 2019-10-22 02:54:50.124 7fd6a80b3700  2 req 161647 0.004s s3:put_obj executing
    -2> 2019-10-22 02:54:51.764 7fd7379d2700 10 monclient: tick
    -1> 2019-10-22 02:54:51.764 7fd73b9da700 10 monclient: tick
     0> 2019-10-22 02:54:52.392 7fd6a80b3700 -1 *** Caught signal (Segmentation fault) **
 in thread 7fd6a80b3700 thread_name:radosgw

 ceph version 14.2.2 (4f8fa0a0024755aae7d95567c63f11d6862d55be) nautilus (stable)
 1: (()+0x12890) [0x7fd74b9c3890]
 2: (()+0x18adb4) [0x7fd74ae0bdb4]
 3: (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::compare(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) const+0x28) [0x55ae0df745e8]
 4: (()+0x5f93c0) [0x55ae0e2b13c0]
 5: (rgw::putobj::RadosWriter::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0xf4) [0x55ae0e2b1614]
 6: (rgw::putobj::ChunkProcessor::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0x1a2) [0x55ae0e2b05b2]
 7: (rgw::putobj::StripeProcessor::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0x15f) [0x55ae0e2b07df]
 8: (RGWPutObj::execute()+0x10cc) [0x55ae0e28b80c]
 9: (rgw_process_authenticated(RGWHandler_REST*, RGWOp*&, RGWRequest*, req_state*, bool)+0x915) [0x55ae0e041185]
 10: (process_request(RGWRados*, RGWREST*, RGWRequest*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, rgw::auth::StrategyRegistry const&, RGWRestfulIO*, OpsLogSocket*, optional_yield, rgw::dmclock::Scheduler*, int*)+0x2340) [0x55ae0e043b70]
 11: (()+0x2f2f58) [0x55ae0dfaaf58]
 12: (()+0x2f39ea) [0x55ae0dfab9ea]
 13: (make_fcontext()+0x2f) [0x55ae0e45124f]
 NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this.

{
    "crash_id": "2019-10-22_00:54:52.395422Z_6f5fd4e3-b4c1-4e77-92e7-4a7a6f3bfe06",
    "timestamp": "2019-10-22 00:54:52.395422Z",
    "process_name": "radosgw",
    "entity_name": "client.rgw.m1-1045558.rgw0",
    "ceph_version": "14.2.2",
    "utsname_hostname": "m1-1045558",
    "utsname_sysname": "Linux",
    "utsname_release": "5.0.0-20-generic",
    "utsname_version": "#21~18.04.1-Ubuntu SMP Thu Jun 27 04:04:37 UTC 2019",
    "utsname_machine": "x86_64",
    "os_name": "Ubuntu",
    "os_id": "ubuntu",
    "os_version_id": "18.04",
    "os_version": "18.04.2 LTS (Bionic Beaver)",
    "backtrace": [
        "(()+0x12890) [0x7fd74b9c3890]",
        "(()+0x18adb4) [0x7fd74ae0bdb4]",
        "(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::compare(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) const+0x28) [0x55ae0df745e8]",
        "(()+0x5f93c0) [0x55ae0e2b13c0]",
        "(rgw::putobj::RadosWriter::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0xf4) [0x55ae0e2b1614]",
        "(rgw::putobj::ChunkProcessor::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0x1a2) [0x55ae0e2b05b2]",
        "(rgw::putobj::StripeProcessor::process(ceph::buffer::v14_2_0::list&&, unsigned long)+0x15f) [0x55ae0e2b07df]",
        "(RGWPutObj::execute()+0x10cc) [0x55ae0e28b80c]",
        "(rgw_process_authenticated(RGWHandler_REST*, RGWOp*&, RGWRequest*, req_state*, bool)+0x915) [0x55ae0e041185]",
        "(process_request(RGWRados*, RGWREST*, RGWRequest*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, rgw::auth::StrategyRegistry const&, RGWRestfulIO*, OpsLogSocket*, optional_yield, rgw::dmclock::Scheduler*, int*)+0x2340) [0x55ae0e043b70]",
        "(()+0x2f2f58) [0x55ae0dfaaf58]",
        "(()+0x2f39ea) [0x55ae0dfab9ea]",
        "(make_fcontext()+0x2f) [0x55ae0e45124f]" 
    ]


Related issues 1 (0 open1 closed)

Is duplicate of Ceph - Bug #41172: Potential crash in putbjResolvedAdam Emerson08/08/2019

Actions
Actions #1

Updated by Casey Bodley over 4 years ago

  • Is duplicate of Bug #41172: Potential crash in putbj added
Actions #2

Updated by Casey Bodley over 4 years ago

  • Status changed from New to Duplicate
Actions

Also available in: Atom PDF