On 12/09, Eric Biggers wrote: > From: Eric Biggers <ebiggers@xxxxxxxxxx> > > META_MAPPING is used to move blocks for both encrypted and verity files. > So the META_MAPPING invalidation condition in do_checkpoint() should > consider verity too, not just encrypt. > > Signed-off-by: Eric Biggers <ebiggers@xxxxxxxxxx> > --- > fs/f2fs/checkpoint.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/fs/f2fs/checkpoint.c b/fs/f2fs/checkpoint.c > index ffdaba0c55d29..44e84ac5c9411 100644 > --- a/fs/f2fs/checkpoint.c > +++ b/fs/f2fs/checkpoint.c > @@ -1509,10 +1509,10 @@ static int do_checkpoint(struct f2fs_sb_info *sbi, struct cp_control *cpc) > f2fs_wait_on_all_pages_writeback(sbi); > > /* > - * invalidate intermediate page cache borrowed from meta inode > - * which are used for migration of encrypted inode's blocks. > + * invalidate intermediate page cache borrowed from meta inode which are > + * used for migration of encrypted or verity inode's blocks. > */ > - if (f2fs_sb_has_encrypt(sbi)) > + if (f2fs_sb_has_encrypt(sbi) || f2fs_sb_has_verity(sbi)) Do we need f2fs_post_read_required() aligned to the condition of move_data_block()? > invalidate_mapping_pages(META_MAPPING(sbi), > MAIN_BLKADDR(sbi), MAX_BLKADDR(sbi) - 1); > > -- > 2.24.0.393.g34dc348eaf-goog