Actions
Bug #54941
opencrash: virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&): assert(is_backfill_target(peer))
Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:
0%
Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):
6bff6aa5922ba8929451f8e4bf8438cdd0cbb08fd64a1cc8e201e869c1d3fd58
c2c3cd5b8ceb90a526b2e190d3aa94702dae383c46d102bee2ee0882bceec502
9c49dd6ee3962faf16a8ba0967f025439254f47d15179ff10e7f73948aaa42f9
f5ee7b62d3262b176bf29cf0a42ad333e4a99740c95489330272e7d5d8cda411
Crash signature (v2):
Description
Assert condition: is_backfill_target(peer)
Assert function: virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)
Sanitized backtrace:
PrimaryLogPG::should_send_op(pg_shard_t, hobject_t const&) ECBackend::try_reads_to_commit() ECBackend::check_ops() ECBackend::handle_sub_write_reply(pg_shard_t, ECSubWriteReply const&, ZTracer::Trace const&) ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>) PGBackend::handle_message(boost::intrusive_ptr<OpRequest>) PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&) OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&) ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&) OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*) ShardedThreadPool::shardedthreadpool_worker(unsigned int) ShardedThreadPool::WorkThreadSharded::entry()
Crash dump sample:
{ "assert_condition": "is_backfill_target(peer)", "assert_file": "osd/PrimaryLogPG.cc", "assert_func": "virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)", "assert_line": 550, "assert_msg": "osd/PrimaryLogPG.cc: In function 'virtual bool PrimaryLogPG::should_send_op(pg_shard_t, const hobject_t&)' thread ffff78e9f840 time 2022-03-07T07:16:53.252732+0000\nosd/PrimaryLogPG.cc: 550: FAILED ceph_assert(is_backfill_target(peer))", "assert_thread_name": "tp_osd_tp", "backtrace": [ "__kernel_rt_sigreturn()", "gsignal()", "abort()", "(ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x1a4) [0xaaaae83cbb94]", "(ceph::__ceph_assertf_fail(char const*, char const*, int, char const*, char const*, ...)+0) [0xaaaae83cbd2c]", "(PrimaryLogPG::should_send_op(pg_shard_t, hobject_t const&)+0x4cc) [0xaaaae855257c]", "(ECBackend::try_reads_to_commit()+0x1240) [0xaaaae87f7058]", "(ECBackend::check_ops()+0x28) [0xaaaae87f87d0]", "(ECBackend::handle_sub_write_reply(pg_shard_t, ECSubWriteReply const&, ZTracer::Trace const&)+0xd0) [0xaaaae87f8930]", "(ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>)+0x2d0) [0xaaaae87fdd80]", "(PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)+0x64) [0xaaaae861ee3c]", "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x4b4) [0xaaaae85c7bbc]", "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x310) [0xaaaae846c850]", "(ceph::osd::scheduler::PGOpItem::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x84) [0xaaaae869fcf4]", "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xbf4) [0xaaaae848a804]", "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x2f0) [0xaaaae8aa2b28]", "(ShardedThreadPool::WorkThreadSharded::entry()+0x18) [0xaaaae8aa54b0]", "/lib64/libpthread.so.0(+0x7898) [0xffff9623f898]", "/lib64/libc.so.6(+0xd1ddc) [0xffff95deaddc]" ], "ceph_version": "16.2.7", "crash_id": "2022-03-07T07:16:53.348363Z_e2eb4467-c37a-4b7b-ad58-839822dc2c56", "entity_name": "osd.218247a2c1189dce066edfdf07ac5d70e6d7a117", "os_id": "centos", "os_name": "CentOS Linux", "os_version": "8", "os_version_id": "8", "process_name": "ceph-osd", "stack_sig": "6bff6aa5922ba8929451f8e4bf8438cdd0cbb08fd64a1cc8e201e869c1d3fd58", "timestamp": "2022-03-07T07:16:53.348363Z", "utsname_machine": "aarch64", "utsname_release": "5.4.0-1053-raspi", "utsname_sysname": "Linux", "utsname_version": "#60-Ubuntu SMP PREEMPT Fri Feb 11 07:18:29 UTC 2022" }
Updated by Telemetry Bot about 2 years ago
Updated by Telemetry Bot almost 2 years ago
- Crash signature (v1) updated (diff)
- Affected Versions v17.2.0 added
Updated by Telemetry Bot 11 months ago
- Crash signature (v1) updated (diff)
- Affected Versions v17.2.5 added
Actions