Project

General

Profile

Actions

Bug #54761

open

crash: virtual void KernelDevice::aio_submit(IOContext*): assert(r == 0)

Added by Telemetry Bot about 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):

05a3b86e32fa5d0590f88909e0edc19e622aeaebbe3f3c5b1afb5466624e79e1


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=798a30456cd34e52945f960409c03284f8ea0e459c984df92e13b296a47049be

Assert condition: r == 0
Assert function: virtual void KernelDevice::aio_submit(IOContext*)

Sanitized backtrace:

    KernelDevice::aio_submit(IOContext*)
    BlueStore::queue_transactions(boost::intrusive_ptr<ObjectStore::CollectionImpl>&, std::vector<ceph::os::Transaction, std::allocator<ceph::os::Transaction> >&, boost::intrusive_ptr<TrackedOp>, ThreadPool::TPHandle*)
    ObjectStore::queue_transaction(boost::intrusive_ptr<ObjectStore::CollectionImpl>&, ceph::os::Transaction&&, boost::intrusive_ptr<TrackedOp>, ThreadPool::TPHandle*)
    non-virtual thunk to PrimaryLogPG::queue_transaction(ceph::os::Transaction&&, boost::intrusive_ptr<OpRequest>)
    ReplicatedBackend::_do_pull_response(boost::intrusive_ptr<OpRequest>)
    ReplicatedBackend::_handle_message(boost::intrusive_ptr<OpRequest>)
    PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)
    PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "assert_condition": "r == 0",
    "assert_file": "blk/kernel/KernelDevice.cc",
    "assert_func": "virtual void KernelDevice::aio_submit(IOContext*)",
    "assert_line": 826,
    "assert_msg": "blk/kernel/KernelDevice.cc: In function 'virtual void KernelDevice::aio_submit(IOContext*)' thread 7f582e63c700 time 2022-03-12T08:25:48.928637+0100\nblk/kernel/KernelDevice.cc: 826: FAILED ceph_assert(r == 0)",
    "assert_thread_name": "tp_osd_tp",
    "backtrace": [
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f5855fc6140]",
        "gsignal()",
        "abort()",
        "(ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x16e) [0x558e2fd88b30]",
        "/usr/bin/ceph-osd(+0xabcc71) [0x558e2fd88c71]",
        "(KernelDevice::aio_submit(IOContext*)+0x28b) [0x558e308e8c9b]",
        "(BlueStore::queue_transactions(boost::intrusive_ptr<ObjectStore::CollectionImpl>&, std::vector<ceph::os::Transaction, std::allocator<ceph::os::Transaction> >&, boost::intrusive_ptr<TrackedOp>, ThreadPool::TPHandle*)+0x5f2) [0x558e303c6ec2]",
        "(ObjectStore::queue_transaction(boost::intrusive_ptr<ObjectStore::CollectionImpl>&, ceph::os::Transaction&&, boost::intrusive_ptr<TrackedOp>, ThreadPool::TPHandle*)+0x83) [0x558e2feaeb83]",
        "(non-virtual thunk to PrimaryLogPG::queue_transaction(ceph::os::Transaction&&, boost::intrusive_ptr<OpRequest>)+0x4d) [0x558e2fffee5d]",
        "(ReplicatedBackend::_do_pull_response(boost::intrusive_ptr<OpRequest>)+0xb32) [0x558e302147a2]",
        "(ReplicatedBackend::_handle_message(boost::intrusive_ptr<OpRequest>)+0xf1) [0x558e30216ae1]",
        "(PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)+0x55) [0x558e300397b5]",
        "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x502) [0x558e2ffd7822]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1bc) [0x558e2fe4554c]",
        "(ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x65) [0x558e300c12a5]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa27) [0x558e2fe76417]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x558e305104ca]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x558e30512830]",
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f5855fbaea7]",
        "clone()" 
    ],
    "ceph_version": "16.2.7",
    "crash_id": "2022-03-12T07:25:48.944122Z_57cfd66f-b661-402c-b171-58130d2f0b2e",
    "entity_name": "osd.a3f55f453e3ee422c85b86ba3bdcc7b8f24a2b9e",
    "os_id": "11",
    "os_name": "Debian GNU/Linux 11 (bullseye)",
    "os_version": "11 (bullseye)",
    "os_version_id": "11",
    "process_name": "ceph-osd",
    "stack_sig": "05a3b86e32fa5d0590f88909e0edc19e622aeaebbe3f3c5b1afb5466624e79e1",
    "timestamp": "2022-03-12T07:25:48.944122Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.13.19-4-pve",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP PVE 5.13.19-9 (Mon, 07 Feb 2022 11:01:14 +0100)" 
}

Actions #1

Updated by Telemetry Bot about 2 years ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v16.2.7 added
Actions

Also available in: Atom PDF