On Thu, Jun 12, 2014 at 7:36 PM, <sf...@users.sourceforge.net> wrote: > > Guan, Nikolay, would you test this patch manually for mm/shmem.c? > It may produce a new warining once. > > > ino = idr_alloc(&sbinfo->idr, inode, 2, INT_MAX, GFP_NOFS); > if (ino > 0) { > inode->i_ino = ino; > mutex_unlock(&sbinfo->idr_lock); > __insert_inode_hash(inode, inode->i_ino); > } else { > + WARN_ON_ONCE(inode->i_ino); > + inode->i_ino = 0; > mutex_unlock(&sbinfo->idr_lock); > iput(inode); /* shmem_free_inode() will be called > */ > inode = NULL; > } > > > J. R. Okajima
Didn't see the new warning after reboot to the patched kernel ... Still the same error messages as before. Guan ------------------------------------------------------------------------------ HPCC Systems Open Source Big Data Platform from LexisNexis Risk Solutions Find What Matters Most in Your Big Data with HPCC Systems Open Source. Fast. Scalable. Simple. Ideal for Dirty Data. Leverages Graph Analysis for Fast Processing & Easy Data Exploration http://p.sf.net/sfu/hpccsystems