[PATCH v13 43/59] ceph: update WARN_ON message to pr_warn

From: Jeff Layton
Date: Tue Apr 05 2022 - 20:40:48 EST


Give some more helpful info

Signed-off-by: Jeff Layton <jlayton@xxxxxxxxxx>
---
fs/ceph/caps.c | 11 +++++++----
1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c
index 1f3a2135214c..cb2c18d43946 100644
--- a/fs/ceph/caps.c
+++ b/fs/ceph/caps.c
@@ -3473,10 +3473,13 @@ static void handle_cap_grant(struct inode *inode,
dout("%p mode 0%o uid.gid %d.%d\n", inode, inode->i_mode,
from_kuid(&init_user_ns, inode->i_uid),
from_kgid(&init_user_ns, inode->i_gid));
-
- WARN_ON_ONCE(ci->fscrypt_auth_len != extra_info->fscrypt_auth_len ||
- memcmp(ci->fscrypt_auth, extra_info->fscrypt_auth,
- ci->fscrypt_auth_len));
+#if IS_ENABLED(CONFIG_FS_ENCRYPTION)
+ if (ci->fscrypt_auth_len != extra_info->fscrypt_auth_len ||
+ memcmp(ci->fscrypt_auth, extra_info->fscrypt_auth,
+ ci->fscrypt_auth_len))
+ pr_warn_ratelimited("%s: cap grant attempt to change fscrypt_auth on non-I_NEW inode (old len %d new len %d)\n",
+ __func__, ci->fscrypt_auth_len, extra_info->fscrypt_auth_len);
+#endif
}

if ((newcaps & CEPH_CAP_LINK_SHARED) &&
--
2.35.1