Bug #56752
opencrash: void pg_missing_set<TrackChanges>::got(const hobject_t&, eversion_t) [with bool TrackChanges = false]: assert(p->second.need <= v || p->second.is_delete())
0%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Assert condition: p->second.need <= v || p->second.is_delete()
Assert function: void pg_missing_set<TrackChanges>::got(const hobject_t&, eversion_t) [with bool TrackChanges = false]
Sanitized backtrace:
PeeringState::on_peer_recover(pg_shard_t, hobject_t const&, eversion_t const&) ReplicatedBackend::handle_push_reply(pg_shard_t, PushReplyOp const&, PushOp*) ReplicatedBackend::do_push_reply(boost::intrusive_ptr<OpRequest>) ReplicatedBackend::_handle_message(boost::intrusive_ptr<OpRequest>) PGBackend::handle_message(boost::intrusive_ptr<OpRequest>) PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&) OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&) ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&) OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*) ShardedThreadPool::shardedthreadpool_worker(unsigned int) ShardedThreadPool::WorkThreadSharded::entry()
Crash dump sample:
{ "archived": "2022-06-28 17:27:02.269520", "assert_condition": "p->second.need <= v || p->second.is_delete()", "assert_file": "osd/osd_types.h", "assert_func": "void pg_missing_set<TrackChanges>::got(const hobject_t&, eversion_t) [with bool TrackChanges = false]", "assert_line": 4910, "assert_msg": "osd/osd_types.h: In function 'void pg_missing_set<TrackChanges>::got(const hobject_t&, eversion_t) [with bool TrackChanges = false]' thread 7f38cc290700 time 2022-06-28T10:17:37.082271-0700\nosd/osd_types.h: 4910: FAILED ceph_assert(p->second.need <= v || p->second.is_delete())", "assert_thread_name": "tp_osd_tp", "backtrace": [ "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f38ed40c140]", "gsignal()", "abort()", "(ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x16e) [0x55e818851b30]", "/usr/bin/ceph-osd(+0xabcc71) [0x55e818851c71]", "(PeeringState::on_peer_recover(pg_shard_t, hobject_t const&, eversion_t const&)+0x1ff) [0x55e818bab4df]", "(ReplicatedBackend::handle_push_reply(pg_shard_t, PushReplyOp const&, PushOp*)+0x504) [0x55e818cd6e84]", "(ReplicatedBackend::do_push_reply(boost::intrusive_ptr<OpRequest>)+0x782) [0x55e818cdf812]", "(ReplicatedBackend::_handle_message(boost::intrusive_ptr<OpRequest>)+0x154) [0x55e818cdfb44]", "(PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)+0x55) [0x55e818b027b5]", "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x502) [0x55e818aa0822]", "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1bc) [0x55e81890e54c]", "(ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x65) [0x55e818b8a2a5]", "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa27) [0x55e81893f417]", "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x55e818fd94ca]", "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x55e818fdb830]", "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f38ed400ea7]", "clone()" ], "ceph_version": "16.2.7", "crash_id": "2022-06-28T17:17:37.146704Z_95e95cb8-d1cd-448e-a049-2b36e63c8c39", "entity_name": "osd.4916906f7ef77f94d953c4532a872a2179a54fe1", "os_id": "11", "os_name": "Debian GNU/Linux 11 (bullseye)", "os_version": "11 (bullseye)", "os_version_id": "11", "process_name": "ceph-osd", "stack_sig": "36d309ba07ee33e850d9f29bd1d3a60256634e4ad4c4c0502c1f8c4f943c8323", "timestamp": "2022-06-28T17:17:37.146704Z", "utsname_machine": "x86_64", "utsname_release": "5.15.35-2-pve", "utsname_sysname": "Linux", "utsname_version": "#1 SMP PVE 5.15.35-5 (Wed, 08 Jun 2022 15:02:51 +0200)" }
Updated by Telemetry Bot over 1 year ago
Updated by Telemetry Bot 12 months ago
- Crash signature (v1) updated (diff)
- Affected Versions v16.2.10, v16.2.9, v17.2.1, v17.2.4, v17.2.5, v17.2.6 added