Uploaded image for project: 'IMPALA'
  1. IMPALA
  2. IMPALA-7396

Fix crashes when thread_creation_fault_injection is enabled

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • None
    • Impala 3.1.0
    • Backend
    • None

    Description

      start-impala-cluster.py --impalad_args=--thread_creation_fault_injection=true && impala-py.test tests/query_test/*.py -n4 --verbos
      
      I0803 16:12:43.783825  8111 status.cc:125] Fake thread creation failure (category: query-exec-state, name: wait-thread)
          @          0x21c9ce7
          @          0x1756094
          @          0x22d1039
          @          0x20bdee8
          @          0x20b70d1
          @          0x20cb2ce
          @          0x34b9dc1
          @          0x34b9856
          @          0x34756cf
          @          0x16edc8e
          @          0x1db44e5
          @          0x1da68fe
          @          0x1da96cb
          @          0x1da94d3
          @          0x1da936c
          @          0x1c40ed7
          @          0x22d1cbf
          @          0x22dceb9
          @          0x22dcd0c
          @          0x38412ca
          @     0x7fd40f54b6ba
          @     0x7fd40f06b41d
      ....
      F0803 16:12:43.804484  8111 coordinator.cc:79] Check failed: exec_state_.Load() != ExecState::EXECUTING (EXECUTING vs. EXECUTING) 
      *** Check failure stack trace: ***
          @          0x4942896
          @          0x493923d
          @          0x493aae2
          @          0x4938c17
          @          0x493c1de
          @          0x36c748b
          @          0x20c0556
          @          0x20ad7b4
          @          0x206baea
          @          0x16f2a65
          @          0x20cb9b2
          @          0x34b9dc1
          @          0x34b9856
          @          0x34756cf
          @          0x16edc8e
      =================================================================
          @          0x1db44e5
          @          0x1da68fe
          @          0x1da96cb
          @          0x1da94d3
          @          0x1da936c
          @          0x1c40ed7
          @          0x22d1cbf
          @          0x22dceb9
          @          0x22dcd0c
          @          0x38412ca
          @     0x7fd40f54b6ba
          @     0x7fd40f06b41d
      Picked up JAVA_TOOL_OPTIONS: -agentlib:jdwp=transport=dt_socket,address=30000,server=y,suspend=n 
      ==7442==ERROR: AddressSanitizer: heap-use-after-free on address 0x60700040ad18 at pc 0x00000170504e bp 0x7fd14bd37720 sp 0x7fd14bd37718
      
      

      Attachments

        Issue Links

          Activity

            People

              tarmstrong Tim Armstrong
              tarmstrong Tim Armstrong
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: