Commit a9bcf9bc authored by Jaegeuk Kim's avatar Jaegeuk Kim

f2fs: don't need to check encrypted inode for partial truncation

The cache_only is always false, if inode is encrypted.
Signed-off-by: default avatarJaegeuk Kim <jaegeuk@kernel.org>
parent 0eb0adad
...@@ -534,8 +534,10 @@ static int truncate_partial_data_page(struct inode *inode, u64 from, ...@@ -534,8 +534,10 @@ static int truncate_partial_data_page(struct inode *inode, u64 from,
truncate_out: truncate_out:
f2fs_wait_on_page_writeback(page, DATA, true); f2fs_wait_on_page_writeback(page, DATA, true);
zero_user(page, offset, PAGE_SIZE - offset); zero_user(page, offset, PAGE_SIZE - offset);
if (!cache_only || !f2fs_encrypted_inode(inode) ||
!S_ISREG(inode->i_mode)) /* An encrypted inode should have a key and truncate the last page. */
f2fs_bug_on(F2FS_I_SB(inode), cache_only && f2fs_encrypted_inode(inode));
if (!cache_only)
set_page_dirty(page); set_page_dirty(page);
f2fs_put_page(page, 1); f2fs_put_page(page, 1);
return 0; return 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment