Project

General

Profile

Bug #56809

crash: MOSDPGScan::encode_payload(unsigned long)

Added by Telemetry Bot over 1 year ago. Updated 10 months ago.

Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:

0%

Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):

0d1a29e4654d60003897883aa212ec3ae2dfd8647c8bfc1c739399c821c6eeb9
af56d3d9b95a100ff4c1563056b0ebdee1e88442aa2dc8a8ac6dadcca5e2bc38


Description

http://telemetry.front.sepia.ceph.com:4000/d/jByk5HaMz/crash-spec-x-ray?orgId=1&var-sig_v2=2fe9b06ce88dccd8c9fe8f41335f5c441df67afd8f333306b7d3f21427e41f20

Sanitized backtrace:

    MOSDPGScan::encode_payload(unsigned long)
    Message::encode(unsigned long, int, bool)
    ProtocolV2::send_message(Message*)
    AsyncConnection::send_message(Message*)
    OSDService::send_message_osd_cluster(int, Message*, unsigned int)
    PrimaryLogPG::recover_backfill(unsigned long, ThreadPool::TPHandle&, bool*)
    PrimaryLogPG::start_recovery_ops(unsigned long, ThreadPool::TPHandle&, unsigned long*)
    OSD::do_recovery(PG*, unsigned int, unsigned long, ThreadPool::TPHandle&)
    ceph::osd::scheduler::PGRecovery::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)
    OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)
    ShardedThreadPool::shardedthreadpool_worker(unsigned int)
    ShardedThreadPool::WorkThreadSharded::entry()

Crash dump sample:
{
    "backtrace": [
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x14140) [0x7f2963327140]",
        "gsignal()",
        "abort()",
        "/lib/x86_64-linux-gnu/libc.so.6(+0x2540f) [0x7f2962ddc40f]",
        "/lib/x86_64-linux-gnu/libc.so.6(+0x34662) [0x7f2962deb662]",
        "(MOSDPGScan::encode_payload(unsigned long)+0x16c) [0x561d4109132c]",
        "(Message::encode(unsigned long, int, bool)+0x2a) [0x561d4173a9fa]",
        "(ProtocolV2::send_message(Message*)+0x25e) [0x561d419b5efe]",
        "(AsyncConnection::send_message(Message*)+0x186) [0x561d419900c6]",
        "(OSDService::send_message_osd_cluster(int, Message*, unsigned int)+0x1ae) [0x561d40ee1a2e]",
        "(PrimaryLogPG::recover_backfill(unsigned long, ThreadPool::TPHandle&, bool*)+0x26af) [0x561d41088c2f]",
        "(PrimaryLogPG::start_recovery_ops(unsigned long, ThreadPool::TPHandle&, unsigned long*)+0xf2a) [0x561d4108de5a]",
        "(OSD::do_recovery(PG*, unsigned int, unsigned long, ThreadPool::TPHandle&)+0x295) [0x561d40eff725]",
        "(ceph::osd::scheduler::PGRecovery::run(OSD*, OSDShard*, boost::intrusive_ptr<PG>&, ThreadPool::TPHandle&)+0x19) [0x561d411b68d9]",
        "(OSD::ShardedOpWQ::_process(unsigned int, ceph::heartbeat_handle_d*)+0x6a4) [0x561d40f1fdc4]",
        "(ShardedThreadPool::shardedthreadpool_worker(unsigned int)+0x41a) [0x561d415ff1aa]",
        "(ShardedThreadPool::WorkThreadSharded::entry()+0x10) [0x561d41601780]",
        "/lib/x86_64-linux-gnu/libpthread.so.0(+0x8ea7) [0x7f296331bea7]",
        "clone()" 
    ],
    "ceph_version": "17.2.1",
    "crash_id": "2022-07-19T15:12:48.844004Z_09852ab2-aca7-40c6-9914-9dbe9fdeb403",
    "entity_name": "osd.5f61a8dde9a7bd160ab88e5fa142b627c27c4976",
    "os_id": "11",
    "os_name": "Debian GNU/Linux 11 (bullseye)",
    "os_version": "11 (bullseye)",
    "os_version_id": "11",
    "process_name": "ceph-osd",
    "stack_sig": "0d1a29e4654d60003897883aa212ec3ae2dfd8647c8bfc1c739399c821c6eeb9",
    "timestamp": "2022-07-19T15:12:48.844004Z",
    "utsname_machine": "x86_64",
    "utsname_release": "5.15.39-1-pve",
    "utsname_sysname": "Linux",
    "utsname_version": "#1 SMP PVE 5.15.39-1 (Wed, 22 Jun 2022 17:22:00 +0200)" 
}

History

#1 Updated by Telemetry Bot over 1 year ago

  • Crash signature (v1) updated (diff)
  • Crash signature (v2) updated (diff)
  • Affected Versions v17.2.0, v17.2.1 added

#2 Updated by Telemetry Bot 10 months ago

  • Crash signature (v1) updated (diff)
  • Affected Versions v17.2.2, v17.2.3, v17.2.4, v17.2.5 added

Also available in: Atom PDF