Project

General

Profile

Actions

Bug #54678

open

crash: void Scrub::ScrubMachine::assert_not_active() const: assert(state_cast<const NotActive*>())

Added by Telemetry Bot about 2 years ago. Updated about 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):

08f38edb104d2dd8a237450c5d3469470b4f5df6f293ccbb8d63a96debe18888
2d98d9c1b3ead33945ba1e48179799c1c02e069e5cd4d8a2ebaa8e387194f72c
2f9bcf5fc86e8be59a3dcbdf0e29b4b3da2c86a4ac364e541c78701ca0e8b776
42f4a4f71dfb4c78153e86327c6b3213f94806652d846a9002bd7ebcb05552cf
8671c9ea4b6f7bf58220e5bf8e66bfd855a2f333184f3aba86c26da7eecdd77f


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=f8a211da681da1852304df0186a7e98816e5da760320c31d57966336a0c5ea61

Assert condition: state_cast<const NotActive*>()
Assert function: void Scrub::ScrubMachine::assert_not_active() const

Sanitized backtrace:

    PgScrubber::replica_scrub_op(boost::intrusive_ptr<OpRequest>)
    PG::replica_scrub(boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "assert_condition": "state_cast<const NotActive*>()",
    "assert_file": "osd/scrub_machine.cc",
    "assert_func": "void Scrub::ScrubMachine::assert_not_active() const",
    "assert_line": 55,
    "assert_msg": "osd/scrub_machine.cc: In function 'void Scrub::ScrubMachine::assert_not_active() const' thread 7f1542cff700 time 2022-02-23T22:22:35.702770+0100\nosd/scrub_machine.cc: 55: FAILED ceph_assert(state_cast<const NotActive*>())",
    "assert_thread_name": "tp_osd_tp",
    "backtrace": [
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f1560414140]",
        "gsignal()",
        "abort()",
        "(ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x16e) [0x55c75843eb30]",
        "/usr/bin/ceph-osd(+0xabcc71) [0x55c75843ec71]",
        "/usr/bin/ceph-osd(+0xf11af6) [0x55c758893af6]",
        "(PgScrubber::replica_scrub_op(boost::intrusive_ptr<OpRequest>)+0x6d4) [0x55c75887d154]",
        "(PG::replica_scrub(boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x5a) [0x55c7585b657a]",
        "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x852) [0x55c75868db72]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1bc) [0x55c7584fb54c]",
        "(ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x65) [0x55c7587771d5]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa27) [0x55c75852c417]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x55c758bc64ca]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x55c758bc8830]",
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f1560408ea7]",
        "clone()" 
    ],
    "ceph_version": "16.2.7",
    "crash_id": "2022-02-23T21:22:35.719504Z_0c5815f6-a40f-441a-8cb6-3d5cdd518b15",
    "entity_name": "osd.c4a51b56a3e9de1ba57d2ae8b8ef3d94c546eb3a",
    "os_id": "11",
    "os_name": "Debian GNU/Linux 11 (bullseye)",
    "os_version": "11 (bullseye)",
    "os_version_id": "11",
    "process_name": "ceph-osd",
    "stack_sig": "2f9bcf5fc86e8be59a3dcbdf0e29b4b3da2c86a4ac364e541c78701ca0e8b776",
    "timestamp": "2022-02-23T21:22:35.719504Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.13.19-3-pve",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP PVE 5.13.19-7 (Thu, 20 Jan 2022 16:37:56 +0100)" 
}

Actions #1

Updated by Telemetry Bot about 2 years ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v16.2.5, v16.2.6, v16.2.7 added
Actions

Also available in: Atom PDF