On Thu, Jun 12, 2014 at 7:36 PM,  <sf...@users.sourceforge.net> wrote:
>
> Guan, Nikolay, would you test this patch manually for mm/shmem.c?
> It may produce a new warining once.
>
>
>                 ino = idr_alloc(&sbinfo->idr, inode, 2, INT_MAX, GFP_NOFS);
>                 if (ino > 0) {
>                         inode->i_ino = ino;
>                         mutex_unlock(&sbinfo->idr_lock);
>                         __insert_inode_hash(inode, inode->i_ino);
>                 } else {
> +                       WARN_ON_ONCE(inode->i_ino);
> +                       inode->i_ino = 0;
>                         mutex_unlock(&sbinfo->idr_lock);
>                         iput(inode);    /* shmem_free_inode() will be called 
> */
>                         inode = NULL;
>                 }
>
>
> J. R. Okajima

Didn't see the new warning after reboot to the patched kernel ...
Still the same error messages as before.

Guan

------------------------------------------------------------------------------
HPCC Systems Open Source Big Data Platform from LexisNexis Risk Solutions
Find What Matters Most in Your Big Data with HPCC Systems
Open Source. Fast. Scalable. Simple. Ideal for Dirty Data.
Leverages Graph Analysis for Fast Processing & Easy Data Exploration
http://p.sf.net/sfu/hpccsystems

Reply via email to