struct crypto_diskcipher *tfm)
{
if (bio && tfm) {
- bio->bi_opf |= (REQ_CRYPT | REQ_AUX_PRIV);
+ bio->bi_opf |= REQ_CRYPT;
bio->bi_aux_private = tfm;
}
crypto_diskcipher_debug(DISKC_API_SET, 0);
/* ci is crypto_tfm_ctx(tfm) */
bh->b_private = priv;
}
- op_flags = REQ_CRYPT | REQ_AUX_PRIV;
+ op_flags = REQ_CRYPT;
if (write == WRITE_MODE) {
memcpy(bh->b_data, data, len);
bio_set_op_attrs(bio, op, op_flags);
crypto_diskcipher_debug(BLK_BH, op_flags);
- if (bio->bi_opf & REQ_AUX_PRIV)
+ if (bio->bi_opf & REQ_CRYPT)
bio->bi_aux_private = bh->b_private;
submit_bio(bio);
return 0;
if (decrypt && fscrypt_has_encryption_key(inode)) {
bh->b_private = fscrypt_get_diskcipher(inode);
if (bh->b_private) {
- bi_opf |= (REQ_CRYPT | REQ_AUX_PRIV);
+ bi_opf |= REQ_CRYPT;
decrypt = 0;
}
}
__REQ_INTEGRITY, /* I/O includes block integrity payload */
__REQ_FUA, /* forced unit access */
__REQ_PREFLUSH, /* request for cache flush */
- __REQ_AUX_PRIV, /* use bi_aux_private */
__REQ_CRYPT, /* request inline crypt */
__REQ_RAHEAD, /* read ahead, can fail anytime */
__REQ_BACKGROUND, /* background IO */
#define REQ_NOMERGE (1ULL << __REQ_NOMERGE)
#define REQ_IDLE (1ULL << __REQ_IDLE)
#define REQ_INTEGRITY (1ULL << __REQ_INTEGRITY)
-#define REQ_AUX_PRIV (1ULL << __REQ_AUX_PRIV)
#define REQ_CRYPT (1ULL << __REQ_CRYPT)
#define REQ_FUA (1ULL << __REQ_FUA)
#define REQ_PREFLUSH (1ULL << __REQ_PREFLUSH)