Actions
Bug #63538
openmds: src/mds/Locker.cc: 2357: FAILED ceph_assert(!cap->is_new())
Status:
Need More Info
Priority:
Normal
Assignee:
Category:
Correctness/Safety
Target version:
% Done:
0%
Source:
Tags:
Backport:
quincy,reef
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Component(FS):
MDS
Labels (FS):
multimds
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
Seen in an internal cluster running multimds.
ceph version 16.2.10-172.el8cp (00a157ecd158911ece116ae43095de793ed9f389) pacific (stable) 1: /lib64/libpthread.so.0(+0x12cf0) [0x7f92764e4cf0] 2: gsignal() 3: abort() 4: (ceph::__ceph_assert_fail(char const*, char const*, int, char const*)+0x1a9) [0x7f92774fb809] 5: /usr/lib64/ceph/libceph-common.so.2(+0x2799d2) [0x7f92774fb9d2] 6: (Locker::issue_caps(CInode*, Capability*)+0x1682) [0x5592893d0ca2] 7: (Locker::simple_sync(SimpleLock*, bool*)+0x4bf) [0x5592893d98ef] 8: (Locker::_rdlock_kick(SimpleLock*, bool)+0x22f) [0x5592893ef35f] 9: (Locker::rdlock_start(SimpleLock*, boost::intrusive_ptr<MDRequestImpl>&, bool)+0xdf) [0x5592893efe5f] 10: (Locker::acquire_locks(boost::intrusive_ptr<MDRequestImpl>&, MutationImpl::LockOpVec&, CInode*, bool)+0x28d6) [0x5592893f2d26] 11: (Server::handle_client_getattr(boost::intrusive_ptr<MDRequestImpl>&, bool)+0x329) [0x559289260269] 12: (Server::dispatch_client_request(boost::intrusive_ptr<MDRequestImpl>&)+0x677) [0x5592892abe57] 13: (Server::handle_client_request(boost::intrusive_ptr<MClientRequest const> const&)+0x403) [0x5592892ace53] 14: (Server::dispatch(boost::intrusive_ptr<Message const> const&)+0x12b) [0x5592892b165b] 15: (MDSRank::handle_message(boost::intrusive_ptr<Message const> const&)+0xbb4) [0x5592892069f4] 16: (MDSRank::_dispatch(boost::intrusive_ptr<Message const> const&, bool)+0x7bb) [0x5592892093ab] 17: (MDSRankDispatcher::ms_dispatch(boost::intrusive_ptr<Message const> const&)+0x55) [0x5592892099a5] 18: (MDSDaemon::ms_dispatch2(boost::intrusive_ptr<Message> const&)+0x108) [0x5592891f9598] 19: (DispatchQueue::entry()+0x126a) [0x7f927774435a] 20: (DispatchQueue::DispatchThread::entry()+0x11) [0x7f92777f77b1] 21: /lib64/libpthread.so.0(+0x81ca) [0x7f92764da1ca] 22: clone() NOTE: a copy of the executable, or `objdump -rdS <executable>` is needed to interpret this.
Updated by Venky Shankar 5 months ago
- Status changed from New to Need More Info
- Assignee set to Venky Shankar
No logs and no core available. Checking back with folks who reported this (downstream).
Actions