From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ZenIV.linux.org.uk (zeniv.linux.org.uk [195.92.253.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3xwrPM1VZmzDrKm for ; Tue, 19 Sep 2017 02:02:29 +1000 (AEST) Date: Mon, 18 Sep 2017 16:43:29 +0100 From: Al Viro To: Christoph Hellwig Cc: Jens Axboe , Abdul Haleem , linuxppc-dev , linux-xfs , linux-next , linux-kernel , chandan Subject: Re: [linux-next][XFS][trinity] WARNING: CPU: 32 PID: 31369 at fs/iomap.c:993 Message-ID: <20170918154328.GA32076@ZenIV.linux.org.uk> References: <1505746565.6990.18.camel@abdul.in.ibm.com> <20170918152706.GA11482@lst.de> <8abed401-1634-760f-6543-4652fa495315@kernel.dk> <20170918153947.GA12635@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <20170918153947.GA12635@lst.de> Sender: Al Viro List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Mon, Sep 18, 2017 at 05:39:47PM +0200, Christoph Hellwig wrote: > On Mon, Sep 18, 2017 at 09:28:55AM -0600, Jens Axboe wrote: > > If it's expected, why don't we kill the WARN_ON_ONCE()? I get it all > > the time running xfstests as well. > > Dave insisted on it to decourage users/applications from mixing > mmap and direct I/O. > > In many ways a tracepoint might be the better way to diagnose these. sysctl suppressing those two, perhaps?