Project

General

Profile

Actions

Bug #54863

open

crash: rocksdb::DBIter::Next()

Added by Telemetry Bot about 2 years ago. Updated about 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):

72eeeb7a19c3e2eb280a95f0b8e7822c63d5fdaa9dbed5afab073ab5d2cc8a68


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=121d5cd8b1786c8dcc7d08aa58cda936008208f3e242114d493ace59dd63589d

Sanitized backtrace:

    rocksdb::DBIter::Next()
    RocksDBStore::RocksDBWholeSpaceIteratorImpl::next()
    BlueStore::OmapIteratorImpl::next()
    PrimaryLogPG::do_osd_ops(PrimaryLogPG::OpContext*, std::vector<OSDOp, std::allocator<OSDOp> >&)
    PrimaryLogPG::prepare_transaction(PrimaryLogPG::OpContext*)
    PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)
    PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "backtrace": [
        "/lib/x86_64-linux-gnu/libc.so.6(+0x46520) [0x7f09dc74a520]",
        "(rocksdb::DBIter::Next()+0x3f0) [0x5577ffbef090]",
        "(RocksDBStore::RocksDBWholeSpaceIteratorImpl::next()+0x4c) [0x5577ffb35efc]",
        "(BlueStore::OmapIteratorImpl::next()+0xb3) [0x5577ff53c4c3]",
        "(PrimaryLogPG::do_osd_ops(PrimaryLogPG::OpContext*, std::vector<OSDOp, std::allocator<OSDOp> >&)+0x5bec) [0x5577ff1a610c]",
        "(PrimaryLogPG::prepare_transaction(PrimaryLogPG::OpContext*)+0xa0) [0x5577ff1b0560]",
        "(PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)+0x29c) [0x5577ff1b0cec]",
        "(PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)+0x27f9) [0x5577ff1b8199]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1b1) [0x5577ff036651]",
        "(ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x69) [0x5577ff2a5069]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa13) [0x5577ff04e013]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x434) [0x5577ff6d8754]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x14) [0x5577ff6daa84]",
        "/lib/x86_64-linux-gnu/libc.so.6(+0x98927) [0x7f09dc79c927]",
        "clone()" 
    ],
    "ceph_version": "16.2.7",
    "crash_id": "2022-02-13T02:17:54.481292Z_082be5c5-b011-442f-91fb-3250f8fb3e35",
    "entity_name": "osd.80431507ed04b2a96d73620984676ab976a624b3",
    "os_id": "22.04",
    "os_name": "Ubuntu Jammy Jellyfish (development branch)",
    "os_version": "22.04 (Jammy Jellyfish)",
    "os_version_id": "22.04",
    "process_name": "ceph-osd",
    "stack_sig": "72eeeb7a19c3e2eb280a95f0b8e7822c63d5fdaa9dbed5afab073ab5d2cc8a68",
    "timestamp": "2022-02-13T02:17:54.481292Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.15.0-17-generic",
    "utsname_sysname": "Linux",
    "utsname_version": "#17-Ubuntu SMP Thu Jan 13 16:27:23 UTC 2022" 
}

Actions #1

Updated by Telemetry Bot about 2 years ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v16.2.7 added
Actions

Also available in: Atom PDF