Actions
Backport #21481
closedjewel: "FileStore.cc: 2930: FAILED assert(0 == "unexpected error")" in fs
Release:
jewel
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
This is jewel v10.2.10
Run: http://pulpito.ceph.com/yuriw-2017-09-19_20:52:59-fs-jewel-distro-basic-smithi/
Job: 1649878
Logs: http://qa-proxy.ceph.com/teuthology/yuriw-2017-09-19_20:52:59-fs-jewel-distro-basic-smithi/1649878/teuthology.log
2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr:os/filestore/FileStore.cc: 2930: FAILED assert(0 == "unexpected error") 2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr: 2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr: ceph version 10.2.9-351-g0ffa38e (0ffa38ee4d074922737485cdd28d101449560107) 2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr: 1: (ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x8b) [0x7f16173e349b] 2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr: 2: (FileStore::_do_transaction(ObjectStore::Transaction&, unsigned long, int, ThreadPool::TPHandle*)+0xefd) [0x7f16170d2a7d] 2017-09-20T02:58:00.419 INFO:tasks.ceph.osd.3.smithi155.stderr: 3: (FileStore::_do_transactions(std::vector<ObjectStore::Transaction, std::allocator<ObjectStore::Transaction> >&, unsigned long, ThreadPool::TPHandle*)+0x3b) [0x7f16170d87bb] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: 4: (FileStore::_do_op(FileStore::OpSequencer*, ThreadPool::TPHandle&)+0x2b5) [0x7f16170d8aa5] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: 5: (ThreadPool::worker(ThreadPool::WorkThread*)+0xa6e) [0x7f16173d487e] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: 6: (ThreadPool::WorkThread::entry()+0x10) [0x7f16173d5760] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: 7: (()+0x8184) [0x7f161589c184] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: 8: (clone()+0x6d) [0x7f16139c737d] 2017-09-20T02:58:00.420 INFO:tasks.ceph.osd.3.smithi155.stderr: NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this.
Actions