Project

General

Profile

Actions

Bug #54910

open

crash: virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&): assert(is_backfill_target(peer))

Added by Telemetry Bot about 2 years ago. Updated about 2 years ago.

Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):

a52995a5aec8e1dd68bb06e8f261b821d5da9135797bc4b9737e5f6d4d31972c


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=d98ac62ec9dcb81a50454bd7666756de4cb94aebac8ca7f5ef1c9179d1377bf6

Assert condition: is_backfill_target(peer)
Assert function: virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)

Sanitized backtrace:

    PrimaryLogPG::should_send_op(pg_shard_t, hobject_t const&)
    ReplicatedBackend::generate_subop(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, ceph::buffer::list const&, std::optional<pg_hit_set_history_t>&, ceph::os::Transaction&, pg_shard_t, pg_info_t const&)
    ReplicatedBackend::issue_op(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> > const&, std::optional<pg_hit_set_history_t>&, ReplicatedBackend::InProgressOp*, ceph::os::Transaction&)
    ReplicatedBackend::submit_transaction(hobject_t const&, object_stat_sum_t const&, eversion_t const&, std::unique_ptr<PGTransaction, std::default_delete<PGTransaction> >&&, eversion_t const&, eversion_t const&, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> >&&, std::optional<pg_hit_set_history_t>&, Context*, unsigned long, osd_reqid_t, boost::intrusive_ptr<OpRequest>)
    PrimaryLogPG::issue_repop(PrimaryLogPG::RepGather*, PrimaryLogPG::OpContext*)
    PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)
    PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)
    PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "assert_condition": "is_backfill_target(peer)",
    "assert_file": "osd/PrimaryLogPG.cc",
    "assert_func": "virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)",
    "assert_line": 550,
    "assert_msg": "osd/PrimaryLogPG.cc: In function 'virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)' thread 7fa80724e700 time 2022-02-27T19:19:44.817811+0000\nosd/PrimaryLogPG.cc: 550: FAILED ceph_assert(is_backfill_target(peer))",
    "assert_thread_name": "tp_osd_tp",
    "backtrace": [
        "/lib64/libpthread.so.0(+0x12c20) [0x7fa829343c20]",
        "gsignal()",
        "abort()",
        "(ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x1a9) [0x562a750f1bcf]",
        "/usr/bin/ceph-osd(+0x56ad98) [0x562a750f1d98]",
        "(PrimaryLogPG::should_send_op(pg_shard_t, hobject_t const&)+0x494) [0x562a752f0294]",
        "(ReplicatedBackend::generate_subop(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, ceph::buffer::v15_2_0::list const&, std::optional<pg_hit_set_history_t>&, ceph::os::Transaction&, pg_shard_t, pg_info_t const&)+0x70e) [0x562a7558352e]",
        "(ReplicatedBackend::issue_op(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> > const&, std::optional<pg_hit_set_history_t>&, ReplicatedBackend::InProgressOp*, ceph::os::Transaction&)+0x4f8) [0x562a75584458]",
        "(ReplicatedBackend::submit_transaction(hobject_t const&, object_stat_sum_t const&, eversion_t const&, std::unique_ptr<PGTransaction, std::default_delete<PGTransaction> >&&, eversion_t const&, eversion_t const&, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> >&&, std::optional<pg_hit_set_history_t>&, Context*, unsigned long, osd_reqid_t, boost::intrusive_ptr<OpRequest>)+0xa94) [0x562a75586ef4]",
        "(PrimaryLogPG::issue_repop(PrimaryLogPG::RepGather*, PrimaryLogPG::OpContext*)+0xcf0) [0x562a75305000]",
        "(PrimaryLogPG::execute_ctx(PrimaryLogPG::OpContext*)+0x115d) [0x562a753611cd]",
        "(PrimaryLogPG::do_op(boost::intrusive_ptr<OpRequest>&)+0x2de2) [0x562a75369d52]",
        "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0xd1c) [0x562a7537109c]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x309) [0x562a751f98e9]",
        "(ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x68) [0x562a75457838]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xc28) [0x562a75219d48]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x5c4) [0x562a7588b5b4]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x14) [0x562a7588e254]",
        "/lib64/libpthread.so.0(+0x817a) [0x7fa82933917a]",
        "clone()" 
    ],
    "ceph_version": "16.2.7",
    "crash_id": "2022-02-27T19:19:44.837158Z_68657629-f64d-4376-bd0a-24f2f67cbc23",
    "entity_name": "osd.dd0eee1da007261bf46c9f488c32cea5d7d2c3f1",
    "os_id": "centos",
    "os_name": "CentOS Linux",
    "os_version": "8",
    "os_version_id": "8",
    "process_name": "ceph-osd",
    "stack_sig": "a52995a5aec8e1dd68bb06e8f261b821d5da9135797bc4b9737e5f6d4d31972c",
    "timestamp": "2022-02-27T19:19:44.837158Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.4.140-1-pve",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP PVE 5.4.140-1 (Wed, 08 Sep 2021 16:21:59 +0200)" 
}

Actions #1

Updated by Telemetry Bot about 2 years ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v16.2.7 added
Actions

Also available in: Atom PDF