* with ->mk_present. There should be no structural
* refs beyond the one associated with the active ref.
*/
- WARN_ON_ONCE(refcount_read(&mk->mk_active_refs) != 1);
+ if (refcount_read(&mk->mk_active_refs) != 1) {
+ printk("fscrypt_destroy_keyring: mk_active_refs = %d\n",
+ refcount_read(&mk->mk_active_refs));
+ WARN_ON_ONCE(refcount_read(&mk->mk_active_refs) != 1);
+ }
WARN_ON_ONCE(refcount_read(&mk->mk_struct_refs) != 1);
WARN_ON_ONCE(!mk->mk_present);
fscrypt_initiate_key_removal(sb, mk);
again:
spin_lock(&sb->s_inode_list_lock);
list_for_each_entry_safe(inode, next, &sb->s_inodes, i_sb_list) {
- if (atomic_read(&inode->i_count))
+ if (atomic_read(&inode->i_count)) {
+ printk("evict_inodes inode %p, i_count = %d, was skipped!\n",
+ inode, atomic_read(&inode->i_count));
continue;
+ }
spin_lock(&inode->i_lock);
if (inode->i_state & (I_NEW | I_FREEING | I_WILL_FREE)) {