diff options
author | Christoph Hellwig <hch@lst.de> | 2022-11-14 05:29:42 +0100 |
---|---|---|
committer | Jens Axboe <axboe@kernel.dk> | 2022-11-21 11:39:05 -0700 |
commit | fce3caea0f241f5d34855c82c399d5e0e2d91f07 (patch) | |
tree | 5deb5097b8018bbfc94b72d6aebef23bd358a3b2 /fs | |
parent | dae590a6c96c799434e0ff8156ef29b88c257e60 (diff) | |
download | linux-stable-fce3caea0f241f5d34855c82c399d5e0e2d91f07.tar.gz linux-stable-fce3caea0f241f5d34855c82c399d5e0e2d91f07.tar.bz2 linux-stable-fce3caea0f241f5d34855c82c399d5e0e2d91f07.zip |
blk-crypto: don't use struct request_queue for public interfaces
Switch all public blk-crypto interfaces to use struct block_device
arguments to specify the device they operate on instead of th
request_queue, which is a block layer implementation detail.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Eric Biggers <ebiggers@google.com>
Link: https://lore.kernel.org/r/20221114042944.1009870-2-hch@lst.de
Signed-off-by: Jens Axboe <axboe@kernel.dk>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/crypto/inline_crypt.c | 8 |
1 files changed, 3 insertions, 5 deletions
diff --git a/fs/crypto/inline_crypt.c b/fs/crypto/inline_crypt.c index cea8b14007e6..55c4d8c23d30 100644 --- a/fs/crypto/inline_crypt.c +++ b/fs/crypto/inline_crypt.c @@ -139,8 +139,7 @@ int fscrypt_select_encryption_impl(struct fscrypt_info *ci) return PTR_ERR(devs); for (i = 0; i < num_devs; i++) { - if (!blk_crypto_config_supported(bdev_get_queue(devs[i]), - &crypto_cfg)) + if (!blk_crypto_config_supported(devs[i], &crypto_cfg)) goto out_free_devs; } @@ -184,8 +183,7 @@ int fscrypt_prepare_inline_crypt_key(struct fscrypt_prepared_key *prep_key, goto fail; } for (i = 0; i < num_devs; i++) { - err = blk_crypto_start_using_key(blk_key, - bdev_get_queue(devs[i])); + err = blk_crypto_start_using_key(devs[i], blk_key); if (err) break; } @@ -224,7 +222,7 @@ void fscrypt_destroy_inline_crypt_key(struct super_block *sb, devs = fscrypt_get_devices(sb, &num_devs); if (!IS_ERR(devs)) { for (i = 0; i < num_devs; i++) - blk_crypto_evict_key(bdev_get_queue(devs[i]), blk_key); + blk_crypto_evict_key(devs[i], blk_key); kfree(devs); } kfree_sensitive(blk_key); |