Match messages in logs (every line would be required to be present in log output Copy from "Messages before crash" column below): | |
Match messages in full crash (every line would be required to be present in crash log output Copy from "Full Crash" column below): | |
Limit to a test: (Copy from below "Failing text"): | |
Delete these reports as invalid (real bug in review or some such) | |
Bug or comment: | |
Extra info: |
Failing Test | Full Crash | Messages before crash | Comment |
---|---|---|---|
hot-pools test 2: lamigo: start with configuration file | LustreError: 44276:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 44276:0:(file.c:4961:ll_flush()) LBUG CPU: 0 PID: 44276 Comm: lfs Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? fpregs_restore_userregs+0x47/0xd0 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? do_user_addr_fault+0x1d6/0x6a0 ? syscall_exit_to_user_mode+0x19/0x40 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f5e1a4fe237 | Lustre: DEBUG MARKER: lctl get_param -n lov.lustre-*.pools.fast 2>/dev/null || echo foo Lustre: DEBUG MARKER: lctl get_param -n lov.lustre-*.pools.fast | sort -u | tr '\n' ' ' Lustre: DEBUG MARKER: lctl get_param -n lov.lustre-*.pools.slow 2>/dev/null || echo foo Lustre: DEBUG MARKER: lctl get_param -n lov.lustre-*.pools.slow | sort -u | tr '\n' ' ' | Link to test |
sanity-lipe test 3: lipe_find -fid works | LustreError: 347198:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 347198:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 347198 Comm: ls Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? fpregs_restore_userregs+0x47/0xd0 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? handle_mm_fault+0x116/0x270 ? do_user_addr_fault+0x1d6/0x6a0 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f779430277b | Link to test | |
sanity-lfsck test 3: LFSCK can verify multiple-linked objects | LustreError: 183497:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 183497:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 183497 Comm: rm Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? ldlm_lock_decref+0x29/0x70 [ptlrpc] ? set_close_on_exec+0x2e/0x70 ? _raw_spin_unlock+0xa/0x30 ? do_fcntl+0x5ee/0x670 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? __do_sys_newfstat+0x57/0x60 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? do_syscall_64+0x6b/0xf0 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7fa5b050277b | Link to test | |
sanity-sec test 54: Encryption policies with fscrypt | LustreError: 495436:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 495436:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 495436 Comm: ls Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? rseq_ip_fixup+0x6e/0x1a0 ? fpregs_restore_userregs+0x47/0xd0 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? mntput_no_expire+0x4a/0x250 ? path_getxattr+0x75/0xb0 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? do_syscall_64+0x6b/0xf0 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f5488d0277b | Lustre: 494532:0:(policy.c:344:llcrypt_ioctl_set_policy()) inode 198158702774059009: forcing policy filenames_encryption_mode to null Lustre: 494537:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 198158702774059009: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: 494634:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 198158702774059009: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: 494634:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) Skipped 2 previous similar messages Lustre: 494852:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 198158702774059009: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-70vm6@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-70vm6@tcp:/lustre/d54.sanity-sec /mnt/lustre Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-70vm6@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-70vm6@tcp:/lustre/d54.sanity-sec/vault /mnt/lustre Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-70vm6@tcp:/lustre /mnt/lustre | Link to test |
sanity-lipe-scan3 test 12: --client-mount is handled correctly | LustreError: 32640:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 32640:0:(file.c:4961:ll_flush()) LBUG CPU: 0 PID: 32640 Comm: find Kdump: loaded Tainted: G OE ------- --- 5.14.0-570.24.1.el9_6.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xe0 ? __count_memcg_events+0x4f/0xb0 ? mm_account_fault+0x6c/0x100 ? handle_mm_fault+0x123/0x250 ? do_user_addr_fault+0x362/0x620 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7fb2dd302aab | Link to test | |
sanity-lipe-find3 test 90: lipe_find3 on an empty FS | LustreError: 34000:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 34000:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 34000 Comm: find Kdump: loaded Tainted: G OE ------- --- 5.14.0-570.24.1.el9_6.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xe0 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xe0 ? cp_new_stat+0x150/0x180 ? __do_sys_newfstatat+0x35/0x60 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xe0 ? folio_add_new_anon_rmap+0x41/0xb0 ? _raw_spin_unlock+0xa/0x30 ? do_anonymous_page+0x1bb/0x3e0 ? __handle_mm_fault+0x2fe/0x650 ? __count_memcg_events+0x4f/0xb0 ? mm_account_fault+0x6c/0x100 ? handle_mm_fault+0x123/0x250 ? do_user_addr_fault+0x362/0x620 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f4b1a902aab | Link to test | |
sanity-sec test 54: Encryption policies with fscrypt | LustreError: 715559:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 715559:0:(file.c:4961:ll_flush()) LBUG CPU: 0 PID: 715559 Comm: ls Kdump: loaded Tainted: G OE ------- --- 5.14.0-570.24.1.el9_6.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xe0 ? do_syscall_64+0x6b/0xe0 ? exit_to_user_mode_loop+0xd9/0x130 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xe0 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xe0 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f29bcb02aab | Lustre: 714630:0:(policy.c:344:llcrypt_ioctl_set_policy()) inode 144115977343205382: forcing policy filenames_encryption_mode to null Lustre: 714680:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Autotest: Test running for 190 minutes (lustre-b_es-reviews_review-exa6-part-1_24932.43) Lustre: 714825:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: 714825:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) Skipped 2 previous similar messages Lustre: 715043:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-78vm7@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-78vm7@tcp:/lustre/d54.sanity-sec /mnt/lustre Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-78vm7@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-78vm7@tcp:/lustre/d54.sanity-sec/vault /mnt/lustre Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-78vm7@tcp:/lustre /mnt/lustre | Link to test |
sanity-lipe-scan3 test 12: --client-mount is handled correctly | LustreError: 32143:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 32143:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 32143 Comm: find Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f06d7b0277b | Link to test | |
sanity-lipe-find3 test 90: lipe_find3 on an empty FS | LustreError: 33481:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 33481:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 33481 Comm: find Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? __count_memcg_events+0x4f/0xb0 ? mm_account_fault+0x6c/0x100 ? handle_mm_fault+0x116/0x270 ? do_user_addr_fault+0x1d6/0x6a0 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f9e4290277b | Link to test | |
sanity-sec test 54: Encryption policies with fscrypt | LustreError: 706626:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 706626:0:(file.c:4961:ll_flush()) LBUG CPU: 1 PID: 706626 Comm: ls Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? do_syscall_64+0x6b/0xf0 ? __x64_sys_getdents64+0x80/0x120 ? __pfx_filldir64+0x10/0x10 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? __irq_exit_rcu+0x46/0xc0 ? sysvec_apic_timer_interrupt+0x3c/0x90 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7f53c290277b | Lustre: 705800:0:(policy.c:344:llcrypt_ioctl_set_policy()) inode 144115977343205382: forcing policy filenames_encryption_mode to null Lustre: 705804:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: 705896:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: 705896:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) Skipped 2 previous similar messages Lustre: 706114:0:(policy.c:471:llcrypt_ioctl_get_policy_ex()) inode 144115977343205382: returning policy filenames_encryption_mode as 4, but is in fact null Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-128vm10@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-128vm10@tcp:/lustre/d54.sanity-sec /mnt/lustre Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: /usr/sbin/lctl get_param -n llite.*.enable_filename_encryption | head -n1 Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-128vm10@tcp:/lustre /mnt/lustre Lustre: DEBUG MARKER: lctl get_param -n mdc.lustre-MDT0000*.import Lustre: DEBUG MARKER: ! grep -q /mnt/lustre' ' /proc/mounts || Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-128vm10@tcp:/lustre/d54.sanity-sec/vault /mnt/lustre Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock trevis-128vm10@tcp:/lustre /mnt/lustre | Link to test |
sanityn test 102: Test open by handle of unlinked file | LustreError: 716146:0:(file.c:4961:ll_flush()) ASSERTION( !(((inode->i_mode) & 00170000) == 0040000) ) failed: LustreError: 716146:0:(file.c:4961:ll_flush()) LBUG CPU: 0 PID: 716146 Comm: lfs Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0x34/0x48 lbug_with_loc.cold+0x5/0x43 [libcfs] ll_flush+0x99/0xa0 [lustre] filp_flush+0x32/0x60 __x64_sys_close+0x2f/0x80 do_syscall_64+0x5f/0xf0 ? fpregs_restore_userregs+0x47/0xd0 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? exit_to_user_mode_loop+0xd9/0x130 ? exit_to_user_mode_prepare+0xef/0x100 ? syscall_exit_to_user_mode+0x19/0x40 ? do_syscall_64+0x6b/0xf0 ? do_user_addr_fault+0x1d6/0x6a0 ? exc_page_fault+0x62/0x150 entry_SYSCALL_64_after_hwframe+0x78/0x80 RIP: 0033:0x7fa1cc4fe237 | Link to test |