Actions
Bug #56796
opencrash: void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool): abort
Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:
0%
Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):
967739ad60ee969cf34f61ee3012dcdf1e5c4c60f6dfb12ab4579b66e7040744
d132e2ca1b42730cde928d98a4263ab87f6aa3434f0558748a35aab99e4161cd
4636a6cc6ae84dced4d57ec733c0ab8e96a46936b8f13db38f38519c7a1104be
6bc04e24f4e883cbf94e63bde86622ecdd08cfe2bef83d079b9594077a9b632c
9d0358bbdfcb6721cce81333de1ceea9ba5157a93ea1e0bb62e59359f1b53e04
b5873cf3d9b005ce33d1691dc9be8e19dca6a7bf0dc6af749be165114f0b10a6
Crash signature (v2):
Description
Assert condition: abort
Assert function: void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)
Sanitized backtrace:
ECBackend::handle_recovery_push(PushOp const&, RecoveryMessages*, bool) ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>) PGBackend::handle_message(boost::intrusive_ptr<OpRequest>) PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&) OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&) ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&) OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*) ShardedThreadPool::shardedthreadpool_worker(unsigned int) ShardedThreadPool::WorkThreadSharded::entry()
Crash dump sample:
{ "archived": "2022-07-23 19:39:02.328172", "assert_condition": "abort", "assert_file": "osd/ECBackend.cc", "assert_func": "void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)", "assert_line": 310, "assert_msg": "osd/ECBackend.cc: In function 'void ECBackend::handle_recovery_push(const PushOp&, RecoveryMessages*, bool)' thread 7f971a697700 time 2022-07-23T12:33:48.870245-0700\nosd/ECBackend.cc: 310: ceph_abort_msg(\"abort() called\")", "assert_thread_name": "tp_osd_tp", "backtrace": [ "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f9736593140]", "gsignal()", "abort()", "(ceph::__ceph_abort(char const*, int, char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&)+0x18a) [0x55adf03664de]", "(ECBackend::handle_recovery_push(PushOp const&, RecoveryMessages*, bool)+0x85) [0x55adf0817085]", "(ECBackend::_handle_message(boost::intrusive_ptr<OpRequest>)+0x575) [0x55adf082d9b5]", "(PGBackend::handle_message(boost::intrusive_ptr<OpRequest>)+0x55) [0x55adf06197b5]", "(PrimaryLogPG::do_request(boost::intrusive_ptr<OpRequest>&, ThreadPool::TPHandle&)+0x502) [0x55adf05b7dc2]", "(OSD::dequeue_op(boost::intrusive_ptr<PG>, boost::intrusive_ptr<OpRequest>, ThreadPool::TPHandle&)+0x1bc) [0x55adf042189c]", "(ceph::osd::scheduler::PGRecoveryMsg::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x65) [0x55adf06a15d5]", "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0xa27) [0x55adf044e367]", "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x55adf0af73da]", "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x55adf0af99b0]", "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f9736587ea7]", "clone()" ], "ceph_version": "16.2.9", "crash_id": "2022-07-23T19:33:48.896663Z_0610f4f5-0aba-4d0a-95e5-8e39426f9bc6", "entity_name": "osd.8284df1bb547e60efa25a0ec00131140a2177692", "os_id": "11", "os_name": "Debian GNU/Linux 11 (bullseye)", "os_version": "11 (bullseye)", "os_version_id": "11", "process_name": "ceph-osd", "stack_sig": "967739ad60ee969cf34f61ee3012dcdf1e5c4c60f6dfb12ab4579b66e7040744", "timestamp": "2022-07-23T19:33:48.896663Z", "utsname_machine": "x86_64", "utsname_release": "5.15.39-1-pve", "utsname_sysname": "Linux", "utsname_version": "#1 SMP PVE 5.15.39-1 (Wed, 22 Jun 2022 17:22:00 +0200)" }
Actions