lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 27 Jan 2021 23:11:14 -0800 From: Chaitanya Kulkarni <chaitanya.kulkarni@....com> To: linux-xfs@...r.kernel.org, linux-fsdevel@...r.kernel.org, dm-devel@...hat.com, linux-block@...r.kernel.org, linux-kernel@...r.kernel.org, drbd-dev@...ts.linbit.com, xen-devel@...ts.xenproject.org, linux-nvme@...ts.infradead.org, linux-scsi@...r.kernel.org, target-devel@...r.kernel.org, linux-fscrypt@...r.kernel.org, jfs-discussion@...ts.sourceforge.net, linux-nilfs@...r.kernel.org, ocfs2-devel@....oracle.com, linux-pm@...r.kernel.org, linux-mm@...ck.org Cc: axboe@...nel.dk, philipp.reisner@...bit.com, lars.ellenberg@...bit.com, konrad.wilk@...cle.com, roger.pau@...rix.com, minchan@...nel.org, ngupta@...are.org, sergey.senozhatsky.work@...il.com, agk@...hat.com, snitzer@...hat.com, hch@....de, sagi@...mberg.me, chaitanya.kulkarni@....com, martin.petersen@...cle.com, viro@...iv.linux.org.uk, tytso@....edu, jaegeuk@...nel.org, ebiggers@...nel.org, djwong@...nel.org, shaggy@...nel.org, konishi.ryusuke@...il.com, mark@...heh.com, jlbec@...lplan.org, joseph.qi@...ux.alibaba.com, damien.lemoal@....com, naohiro.aota@....com, jth@...nel.org, rjw@...ysocki.net, len.brown@...el.com, pavel@....cz, akpm@...ux-foundation.org, hare@...e.de, gustavoars@...nel.org, tiwai@...e.de, alex.shi@...ux.alibaba.com, asml.silence@...il.com, ming.lei@...hat.com, tj@...nel.org, osandov@...com, bvanassche@....org, jefflexu@...ux.alibaba.com Subject: [RFC PATCH 15/34] fscrypt: use bio_new in fscrypt_zeroout_range Signed-off-by: Chaitanya Kulkarni <chaitanya.kulkarni@....com> --- fs/crypto/bio.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/fs/crypto/bio.c b/fs/crypto/bio.c index b048a0e38516..20dab9bdf098 100644 --- a/fs/crypto/bio.c +++ b/fs/crypto/bio.c @@ -148,12 +148,11 @@ int fscrypt_zeroout_range(const struct inode *inode, pgoff_t lblk, return -EINVAL; /* This always succeeds since __GFP_DIRECT_RECLAIM is set. */ - bio = bio_alloc(GFP_NOFS, nr_pages); + bio = bio_alloc(inode->i_sb->s_bdev, 0, REQ_OP_WRITE, 0, nr_pages, + GFP_NOFS); do { - bio_set_dev(bio, inode->i_sb->s_bdev); bio->bi_iter.bi_sector = pblk << (blockbits - 9); - bio_set_op_attrs(bio, REQ_OP_WRITE, 0); i = 0; offset = 0; -- 2.22.1
Powered by blists - more mailing lists