From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from newverein.lst.de (verein.lst.de [213.95.11.211]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3xwqvB6PfMzDrX7 for ; Tue, 19 Sep 2017 01:39:50 +1000 (AEST) Date: Mon, 18 Sep 2017 17:39:47 +0200 From: Christoph Hellwig To: Jens Axboe Cc: Christoph Hellwig , Abdul Haleem , linuxppc-dev , linux-xfs , linux-next , linux-kernel , chandan Subject: Re: [linux-next][XFS][trinity] WARNING: CPU: 32 PID: 31369 at fs/iomap.c:993 Message-ID: <20170918153947.GA12635@lst.de> References: <1505746565.6990.18.camel@abdul.in.ibm.com> <20170918152706.GA11482@lst.de> <8abed401-1634-760f-6543-4652fa495315@kernel.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <8abed401-1634-760f-6543-4652fa495315@kernel.dk> List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Mon, Sep 18, 2017 at 09:28:55AM -0600, Jens Axboe wrote: > If it's expected, why don't we kill the WARN_ON_ONCE()? I get it all > the time running xfstests as well. Dave insisted on it to decourage users/applications from mixing mmap and direct I/O. In many ways a tracepoint might be the better way to diagnose these.