Actions
Bug #61138
opencrash: MOSDRepOp::encode_payload(unsigned long)
Status:
New
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
% Done:
0%
Source:
Telemetry
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(RADOS):
Pull request ID:
Crash signature (v1):
acf991f216ba25d59c5cc83ce2cf79f65e2e54e4555a2a42d3fcbb58b6d82b55
Crash signature (v2):
Description
Sanitized backtrace:
MOSDRepOp::encode_payload(unsigned long) Message::encode(unsigned long, int, bool) ProtocolV2::send_message(Message*) AsyncConnection::send_message(Message*) OSDService::send_message_osd_cluster(int, Message*, unsigned int) ReplicatedBackend::issue_op(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> > const&, std::optional<pg_hit_set_history_t>&, ReplicatedBackend::InProgressOp*, ceph::os::Transaction&) ReplicatedBackend::submit_transaction(hobject_t const&, object_stat_sum_t const&, eversion_t const&, std::unique_ptr<PGTransaction, std::default_delete<PGTransaction> >&&, eversion_t const&, eversion_t const&, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> >&&, std::optional<pg_hit_set_history_t>&, Context*, unsigned long, osd_reqid_t, boost::intrusive_ptr<OpRequest>) PrimaryLogPG::issue_repop(PrimaryLogPG::RepGather*, PrimaryLogPG::OpContext*) PrimaryLogPG::simple_opc_submit(std::unique_ptr<PrimaryLogPG::OpContext, std::default_delete<PrimaryLogPG::OpContext> >) PrimaryLogPG::agent_maybe_evict(std::shared_ptr<ObjectContext>&, bool) PrimaryLogPG::agent_work(int, int) OSDService::agent_entry() OSDService::AgentThread::entry()
Crash dump sample:
{ "backtrace": [ "/lib/x86_64-linux-gnu/libpthread.so.0(+0x13140) [0x7f195a81f140]", "gsignal()", "abort()", "/lib/x86_64-linux-gnu/libc.so.6(+0x2240f) [0x7f195a2c240f]", "/lib/x86_64-linux-gnu/libc.so.6(+0x31662) [0x7f195a2d1662]", "(MOSDRepOp::encode_payload(unsigned long)+0x2d0) [0x55eb1ddaa4e0]", "(Message::encode(unsigned long, int, bool)+0x2a) [0x55eb1e20cc7a]", "(ProtocolV2::send_message(Message*)+0x25e) [0x55eb1e489aae]", "(AsyncConnection::send_message(Message*)+0x186) [0x55eb1e463c76]", "(OSDService::send_message_osd_cluster(int, Message*, unsigned int)+0x1ae) [0x55eb1d9ad44e]", "(ReplicatedBackend::issue_op(hobject_t const&, eversion_t const&, unsigned long, osd_reqid_t, eversion_t, eversion_t, hobject_t, hobject_t, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> > const&, std::optional<pg_hit_set_history_t>&, ReplicatedBackend::InProgressOp*, ceph::os::Transaction&)+0x649) [0x55eb1dd90709]", "(ReplicatedBackend::submit_transaction(hobject_t const&, object_stat_sum_t const&, eversion_t const&, std::unique_ptr<PGTransaction, std::default_delete<PGTransaction> >&&, eversion_t const&, eversion_t const&, std::vector<pg_log_entry_t, std::allocator<pg_log_entry_t> >&&, std::optional<pg_hit_set_history_t>&, Context*, unsigned long, osd_reqid_t, boost::intrusive_ptr<OpRequest>)+0x5d4) [0x55eb1dd93c74]", "(PrimaryLogPG::issue_repop(PrimaryLogPG::RepGather*, PrimaryLogPG::OpContext*)+0x50d) [0x55eb1dae661d]", "(PrimaryLogPG::simple_opc_submit(std::unique_ptr<PrimaryLogPG::OpContext, std::default_delete<PrimaryLogPG::OpContext> >)+0x56) [0x55eb1dae82b6]", "(PrimaryLogPG::agent_maybe_evict(std::shared_ptr<ObjectContext>&, bool)+0x841) [0x55eb1db14da1]", "(PrimaryLogPG::agent_work(int, int)+0x10b0) [0x55eb1db1a840]", "(OSDService::agent_entry()+0x19b) [0x55eb1d9e707b]", "(OSDService::AgentThread::entry()+0xd) [0x55eb1da4ddbd]", "/lib/x86_64-linux-gnu/libpthread.so.0(+0x7ea7) [0x7f195a813ea7]", "clone()" ], "ceph_version": "17.2.5", "crash_id": "2023-05-04T15:01:12.568204Z_78aaad7d-5b85-4385-9b4e-3fb4e25d68af", "entity_name": "osd.31c7d8c587cef38206d8a10fb04724c9fa455a18", "os_id": "11", "os_name": "Debian GNU/Linux 11 (bullseye)", "os_version": "11 (bullseye)", "os_version_id": "11", "process_name": "ceph-osd", "stack_sig": "acf991f216ba25d59c5cc83ce2cf79f65e2e54e4555a2a42d3fcbb58b6d82b55", "timestamp": "2023-05-04T15:01:12.568204Z", "utsname_machine": "x86_64", "utsname_release": "5.13.19-6-pve", "utsname_sysname": "Linux", "utsname_version": "#1 SMP PVE 5.13.19-15 (Tue, 29 Mar 2022 15:59:50 +0200)" }
Actions