Project

General

Profile

Bug #56796

crash: void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool): abort

Added by Telemetry Bot over 1 year ago. Updated 10 months ago.

Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):

967739ad60ee969cf34f61ee3012dcdf1e5c4c60f6dfb12ab4579b66e7040744
d132e2ca1b42730cde928d98a4263ab87f6aa3434f0558748a35aab99e4161cd
4636a6cc6ae84dced4d57ec733c0ab8e96a46936b8f13db38f38519c7a1104be
6bc04e24f4e883cbf94e63bde86622ecdd08cfe2bef83d079b9594077a9b632c
9d0358bbdfcb6721cce81333de1ceea9ba5157a93ea1e0bb62e59359f1b53e04
b5873cf3d9b005ce33d1691dc9be8e19dca6a7bf0dc6af749be165114f0b10a6


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=dbf2120428a133c3689fa50851f0033484f15ebc63230332edcf8a12d60bebfb

Assert condition: abort
Assert function: void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)

Sanitized backtrace:

    ECBackend::handle_recovery_push(PushOp const&, RecoveryMessages*, bool)
    ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>)
    PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)
    PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)
    OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "archived": "2022-07-23 19:39:02.328172",
    "assert_condition": "abort",
    "assert_file": "osd/ECBackend.cc",
    "assert_func": "void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)",
    "assert_line": 310,
    "assert_msg": "osd/ECBackend.cc: In function 'void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)' thread 7f971a697700 time 2022-07-23T12:33:48.870245-0700\nosd/ECBackend.cc: 310: ceph_abort_msg(\"abort() called\")",
    "assert_thread_name": "tp_osd_tp",
    "backtrace": [
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f9736593140]",
        "gsignal()",
        "abort()",
        "(ceph::__ceph_abort(char const*, int, char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&)+0x18a) [0x55adf03664de]",
        "(ECBackend::handle_recovery_push(PushOp const&, RecoveryMessages*, bool)+0x85) [0x55adf0817085]",
        "(ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>)+0x575) [0x55adf082d9b5]",
        "(PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)+0x55) [0x55adf06197b5]",
        "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x502) [0x55adf05b7dc2]",
        "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1bc) [0x55adf042189c]",
        "(ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x65) [0x55adf06a15d5]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa27) [0x55adf044e367]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x55adf0af73da]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x55adf0af99b0]",
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f9736587ea7]",
        "clone()" 
    ],
    "ceph_version": "16.2.9",
    "crash_id": "2022-07-23T19:33:48.896663Z_0610f4f5-0aba-4d0a-95e5-8e39426f9bc6",
    "entity_name": "osd.8284df1bb547e60efa25a0ec00131140a2177692",
    "os_id": "11",
    "os_name": "Debian GNU/Linux 11 (bullseye)",
    "os_version": "11 (bullseye)",
    "os_version_id": "11",
    "process_name": "ceph-osd",
    "stack_sig": "967739ad60ee969cf34f61ee3012dcdf1e5c4c60f6dfb12ab4579b66e7040744",
    "timestamp": "2022-07-23T19:33:48.896663Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.15.39-1-pve",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP PVE 5.15.39-1 (Wed, 22 Jun 2022 17:22:00 +0200)" 
}

History

#1 Updated by Telemetry Bot over 1 year ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v16.2.7, v16.2.9 added

#2 Updated by Telemetry Bot 10 months ago

  • Crash signature (v1) updated (diff)
  • Affected Versions v16.2.11, v17.2.0, v17.2.3, v17.2.5 added

Also available in: Atom PDF