Uploaded image for project: 'Traffic Server'
  1. Traffic Server
  2. TS-1219

Crash report: ink_freelist_new causing core dumps

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Major
    • Resolution: Fixed
    • 3.0.4, 3.0.2
    • None
    • Core

    Description

      Our TS based production boxes are seeing a couple of crashes per day with stack traces ending in

      #3 0x00000000004c85ea in signal_handler (sig=11) at signals.cc:225
      #4 <signal handler called>
      #5 0x0000003312414160 in ink_freelist_new (f=0x3312629ce0) at ink_queue.cc:326
      #6 0x000000331240d47a in alloc_void (this=0x7fff80173cd8, size=511, alignment=1) at Allocator.h:208
      #7 blk_alloc (this=0x7fff80173cd8, size=511, alignment=1) at Arena.cc:45
      #8 Arena::alloc (this=0x7fff80173cd8, size=511, alignment=1) at Arena.cc:118
      #9 0x0000000000569b93 in str_alloc (arena=<value optimized out>,
      url=0x31be6a8 "*************"...,
      len_in=<value optimized out>, len_out=0x7fff80173d20) at ../../lib/ts/Arena.h:123
      #10 LogUtils::escapify_url (arena=<value optimized out>,
      url=0x31be6a8 "*************"...,
      len_in=<value optimized out>, len_out=0x7fff80173d20) at LogUtils.cc:392
      #11 0x00000000005482e9 in LogAccessHttp::init (this=0x7fff80173cc0) at LogAccessHttp.cc:98
      #12 0x000000000054b436 in Log::access (lad=0x7fff80173cc0) at Log.cc:1055
      #13 0x00000000004f3085 in HttpSM::update_stats (this=0x2ae5480651e0) at HttpSM.cc:6044
      #14 0x00000000004f8918 in HttpSM::kill_this (this=0x2ae5480651e0) at HttpSM.cc:6005
      #15 0x00000000004f8c08 in HttpSM::main_handler (this=0x2ae5480651e0, event=2301, data=0x2ae548066ec8)
      at HttpSM.cc:2452

      The URL was valid, I just "anonymized" it. This is our environment

      $ uname -a
      Linux xxx.prod 2.6.32-131.4.1.el6.x86_64 #1 SMP Fri Jun 10 10:54:26 EDT 2011 x86_64 x86_64 x86_64 GNU/Linux

      $ file /usr/bin/traffic_server
      /usr/bin/traffic_server: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.18, stripped

      There doesn't seem to be more useful information in the frame:

      (gdb) f 5
      #5 0x0000003312414160 in ink_freelist_new (f=0x3312629ce0) at ink_queue.cc:326
      326 FREELIST_VERSION(item) + 1);
      (gdb) list
      321 fastalloc_mem_in_use += f->chunk_size * f->type_size;
      322 #endif
      323
      324 } else {
      325 SET_FREELIST_POINTER_VERSION(next, *ADDRESS_OF_NEXT(TO_PTR(FREELIST_POINTER(item)), f->offset),
      326 FREELIST_VERSION(item) + 1);
      327 #if !defined(INK_USE_MUTEX_FOR_FREELISTS)
      328 result = ink_atomic_cas64((int64_t *) & f->head.data, item.data, next.data);
      329 #else
      330 f->head.data = next.data;
      (gdb) p next
      $2 = <value optimized out>
      (gdb) p f
      $3 = (InkFreeList *) 0x3312629ce0
      (gdb) p *f
      $4 = {head =

      {data = -8941773651046140890}

      , name = 0x331241e92f "ArenaBlock", type_size = 1024, chunk_size = 128,
      count = 519, allocated = 1536, offset = 0, alignment = 8, allocated_base = 0, count_base = 0}
      (gdb) p item
      $5 =

      {data = -8953314125091277786}

      Attachments

        Activity

          People

            Unassigned Unassigned
            manjeshnilange Manjesh Nilange
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: