Re: virtual machines crashes after upgrade to octopus

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 13, 2020 at 6:00 PM Lomayani S. Laizer <lomlaizer@xxxxxxxxx> wrote:
>
> Hello,
>
> Below is full debug log of 2 minutes before crash of virtual machine. Download from below url
>
> https://storage.habari.co.tz/index.php/s/31eCwZbOoRTMpcU

This log has rbd debug output, but not rados :(

I guess you'll need to try and capture a coredump if you can't get a backtrace.

I'd also suggest opening a tracker in case one of the rbd devs has any
ideas on this, or has seen something similar. Without a backtrace or
core it will be impossible to definitively identify the issue though.

>
>
> apport.log
>
> Wed May 13 09:35:30 2020: host pid 4440 crashed in a separate mount namespace, ignoring
>
> kernel.log
> May 13 09:35:30 compute5 kernel: [123071.373217] fn-radosclient[4485]: segfault at 0 ip 00007f4c8c85d7ed sp 00007f4c66ffc470 error 4 in librbd.so.1.12.0[7f4c8c65a000+5cb000]
> May 13 09:35:30 compute5 kernel: [123071.373228] Code: 8d 44 24 08 48 81 c3 d8 3e 00 00 49 21 f9 48 c1 e8 30 83 c0 01 48 c1 e0 30 48 89 02 48 8b 03 48 89 04 24 48 8b 34 24 48 21 fe <48> 8b 06 48 89 44 24 08 48 8b 44 24 08 48 8b 0b 48 21 f8 48 39 0c
> May 13 09:35:33 compute5 kernel: [123074.832700] brqa72d845b-e9: port 1(tap33511c4d-2c) entered disabled state
> May 13 09:35:33 compute5 kernel: [123074.838520] device tap33511c4d-2c left promiscuous mode
> May 13 09:35:33 compute5 kernel: [123074.838527] brqa72d845b-e9: port 1(tap33511c4d-2c) entered disabled state
>
> syslog
> compute5 kernel: [123071.373217] fn-radosclient[4485]: segfault at 0 ip 00007f4c8c85d7ed sp 00007f4c66ffc470 error 4 i
> n librbd.so.1.12.0[7f4c8c65a000+5cb000]
> May 13 09:35:30 compute5 kernel: [123071.373228] Code: 8d 44 24 08 48 81 c3 d8 3e 00 00 49 21 f9 48 c1 e8 30 83 c0 01 48 c1 e0 30 48 8
> 9 02 48 8b 03 48 89 04 24 48 8b 34 24 48 21 fe <48> 8b 06 48 89 44 24 08 48 8b 44 24 08 48 8b 0b 48 21 f8 48 39 0c
> May 13 09:35:30 compute5 libvirtd[1844]: internal error: End of file from qemu monitor
> May 13 09:35:33 compute5 systemd-networkd[1326]: tap33511c4d-2c: Link DOWN
> May 13 09:35:33 compute5 systemd-networkd[1326]: tap33511c4d-2c: Lost carrier
> May 13 09:35:33 compute5 kernel: [123074.832700] brqa72d845b-e9: port 1(tap33511c4d-2c) entered disabled state
> May 13 09:35:33 compute5 kernel: [123074.838520] device tap33511c4d-2c left promiscuous mode
> May 13 09:35:33 compute5 kernel: [123074.838527] brqa72d845b-e9: port 1(tap33511c4d-2c) entered disabled state
> May 13 09:35:33 compute5 networkd-dispatcher[1614]: Failed to request link: No such device
>
> On Fri, May 8, 2020 at 5:40 AM Brad Hubbard <bhubbard@xxxxxxxxxx> wrote:
>>
>> On Fri, May 8, 2020 at 12:10 PM Lomayani S. Laizer <lomlaizer@xxxxxxxxx> wrote:
>> >
>> > Hello,
>> > On my side at point of vm crash these are logs below. At the moment my debug is at 10 value. I will rise to 20 for full debug. these crashes are random and so far happens on very busy vms. Downgrading clients in host to Nautilus these crashes disappear
>>
>> You could try adding debug_rados as well but you may get a very large
>> log so keep an eye on things.
>>
>> >
>> > Qemu is not shutting down in general because other vms on the same host continues working
>>
>> A process can not reliably continue after encountering a segfault so
>> the qemu-kvm process must be ending and therefore it should be
>> possible to capture a coredump with the right configuration.
>>
>> In the following example, if you were to search for pid 6060 you would
>> find it is no longer running.
>> >> > [ 7682.233684] fn-radosclient[6060]: segfault at 2b19 ip 00007f8165cc0a50 sp 00007f81397f6490 error 4 in librbd.so.1.12.0[7f8165ab4000+537000]
>>
>> Without a backtrace at a minimum it may be very difficult to work out
>> what's going on with certainty. If you open a tracker for the issue
>> though maybe one of the devs specialising in rbd may have some
>> feedback.
>>
>> >
>> > 2020-05-07T13:02:12.121+0300 7f88d57fa700 10 librbd::io::ReadResult: 0x7f88c80bfbf0 finish:  got {} for [0,24576] bl 24576
>> > 2020-05-07T13:02:12.193+0300 7f88d57fa700 10 librbd::io::ReadResult: 0x7f88c80f9330 finish: C_ObjectReadRequest: r=0
>> > 2020-05-07T13:02:12.193+0300 7f88d57fa700 10 librbd::io::ReadResult: 0x7f88c80f9330 finish:  got {} for [0,16384] bl 16384
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::ImageState: 0x5569b5da9bb0 0x5569b5da9bb0 send_close_unlock
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::ImageState: 0x5569b5da9bb0 0x5569b5da9bb0 send_close_unlock
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_block_image_watcher
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::ImageWatcher: 0x7f88c400dfe0 block_notifies
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500  5 librbd::Watcher: 0x7f88c400dfe0 block_notifies: blocked_count=1
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_block_image_watcher: r=0
>> > 2020-05-07T13:02:28.694+0300 7f890ba90500 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_shut_down_update_watchers
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_shut_down_update_watchers: r=0
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_shut_down_io_queue
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700  5 librbd::io::ImageRequestWQ: 0x7f88e8001570 shut_down: shut_down: in_flight=0
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_shut_down_io_queue: r=0
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_shut_down_exclusive_lock
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::ExclusiveLock: 0x7f88c4011ba0 shut_down
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 shut_down:
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 send_shutdown:
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 send_shutdown_release:
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::ExclusiveLock: 0x7f88c4011ba0 pre_release_lock_handler
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_cancel_op_requests:
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_cancel_op_requests: r=0
>> > 2020-05-07T13:02:28.694+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_block_writes:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700  5 librbd::io::ImageRequestWQ: 0x7f88e8001570 block_writes: 0x5569b5e1ffd0, num=1
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_block_writes: r=0
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_wait_for_ops:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_wait_for_ops:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_invalidate_cache:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700  5 librbd::io::ObjectDispatcher: 0x5569b5dab700 invalidate_cache:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_invalidate_cache: r=0
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_flush_notifies:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_flush_notifies:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_close_object_map:
>> > 2020-05-07T13:02:28.698+0300 7f88d4ff9700 10 librbd::object_map::UnlockRequest: 0x7f88c807a450 send_unlock: oid=rbd_object_map.2f18f2a67fad72
>> > 2020-05-07T13:02:28.702+0300 7f88d57fa700 10 librbd::object_map::UnlockRequest: 0x7f88c807a450 handle_unlock: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d57fa700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 handle_close_object_map: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d57fa700 10 librbd::exclusive_lock::PreReleaseRequest: 0x7f88c80b6020 send_unlock:
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 handle_shutdown_pre_release: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::managed_lock::ReleaseRequest: 0x7f88c80b68a0 send_unlock: entity=client.58292796, cookie=auto 140225447738256
>> > 2020-05-07T13:02:28.702+0300 7f88d57fa700 10 librbd::managed_lock::ReleaseRequest: 0x7f88c80b68a0 handle_unlock: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ExclusiveLock: 0x7f88c4011ba0 post_release_lock_handler: r=0 shutting_down=1
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700  5 librbd::io::ImageRequestWQ: 0x7f88e8001570 unblock_writes: 0x5569b5e1ffd0, num=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ImageWatcher: 0x7f88c400dfe0 notify released lock
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ImageWatcher: 0x7f88c400dfe0 current lock owner: [0,0]
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 handle_shutdown_post_release: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 wait_for_tracked_ops: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ManagedLock: 0x7f88c4011bb8 complete_shutdown: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_shut_down_exclusive_lock: r=0
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_unregister_image_watcher
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::ImageWatcher: 0x7f88c400dfe0 unregistering image watcher
>> > 2020-05-07T13:02:28.702+0300 7f88d4ff9700 10 librbd::Watcher: 0x7f88c400dfe0 unregister_watch:
>> > 2020-05-07T13:02:28.702+0300 7f88d57fa700  5 librbd::Watcher: 0x7f88c400dfe0 notifications_blocked: blocked=1
>> > 2020-05-07T13:02:28.706+0300 7f88ceffd700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_unregister_image_watcher: r=0
>> > 2020-05-07T13:02:28.706+0300 7f88ceffd700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_flush_readahead
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_flush_readahead: r=0
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_shut_down_object_dispatcher
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700  5 librbd::io::ObjectDispatcher: 0x5569b5dab700 shut_down:
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700  5 librbd::io::ObjectDispatch: 0x5569b5ee8360 shut_down:
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700  5 librbd::io::SimpleSchedulerObjectDispatch: 0x7f88c4013ce0 shut_down:
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700  5 librbd::cache::WriteAroundObjectDispatch: 0x7f88c8003780 shut_down:
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_shut_down_object_dispatcher: r=0
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 send_flush_op_work_queue
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_flush_op_work_queue: r=0
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::image::CloseRequest: 0x7f88c8175fd0 handle_flush_image_watcher: r=0
>> > 2020-05-07T13:02:28.706+0300 7f88d4ff9700 10 librbd::ImageState: 0x5569b5da9bb0 0x5569b5da9bb0 handle_close: r=0
>> >
>> > On Fri, May 8, 2020 at 12:40 AM Brad Hubbard <bhubbard@xxxxxxxxxx> wrote:
>> >>
>> >> On Fri, May 8, 2020 at 3:42 AM Erwin Lubbers <erwin@xxxxxxxxxxx> wrote:
>> >> >
>> >> > Hi,
>> >> >
>> >> > Did anyone found a way to resolve the problem? I'm seeing the same on a clean Octopus Ceph installation on Ubuntu 18 with an Octopus compiled KVM server running on CentOS 7.8. The KVM machine shows:
>> >> >
>> >> > [ 7682.233684] fn-radosclient[6060]: segfault at 2b19 ip 00007f8165cc0a50 sp 00007f81397f6490 error 4 in librbd.so.1.12.0[7f8165ab4000+537000]
>> >>
>> >> Are you able to either capture a backtrace from a coredump or set up
>> >> logging and hopefully capture a backtrace that way?
>> >>
>> >> >
>> >> > Ceph is healthy and stable for a few weeks and I did not get these messages while running on KVM compiled with Luminous libraries.
>> >> >
>> >> > Regards,
>> >> > Erwin
>> >> > _______________________________________________
>> >> > ceph-users mailing list -- ceph-users@xxxxxxx
>> >> > To unsubscribe send an email to ceph-users-leave@xxxxxxx
>> >> >
>> >>
>> >>
>> >> --
>> >> Cheers,
>> >> Brad
>> >> _______________________________________________
>> >> ceph-users mailing list -- ceph-users@xxxxxxx
>> >> To unsubscribe send an email to ceph-users-leave@xxxxxxx
>>
>>
>>
>> --
>> Cheers,
>> Brad
>>


-- 
Cheers,
Brad
_______________________________________________
ceph-users mailing list -- ceph-users@xxxxxxx
To unsubscribe send an email to ceph-users-leave@xxxxxxx



[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Ceph Dev]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux