Skip to content

Commit bc84199

Browse files
committed
Merge branch 'for-5.18/block' into for-5.18/64bit-pi
* for-5.18/block: (96 commits) block: remove bio_devname ext4: stop using bio_devname raid5-ppl: stop using bio_devname raid1: stop using bio_devname md-multipath: stop using bio_devname dm-integrity: stop using bio_devname dm-crypt: stop using bio_devname pktcdvd: remove a pointless debug check in pkt_submit_bio block: remove handle_bad_sector block: fix and cleanup bio_check_ro bfq: fix use-after-free in bfq_dispatch_request blk-crypto: show crypto capabilities in sysfs block: don't delete queue kobject before its children block: simplify calling convention of elv_unregister_queue() block: remove redundant semicolon block: default BLOCK_LEGACY_AUTOLOAD to y block: update io_ticks when io hang block, bfq: don't move oom_bfqq block, bfq: avoid moving bfqq to it's parent bfqg block, bfq: cleanup bfq_bfqq_to_bfqg() ...
2 parents ffb217a + 9793961 commit bc84199

183 files changed

Lines changed: 2006 additions & 3593 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

Documentation/ABI/stable/sysfs-block

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,55 @@ Description:
155155
last zone of the device which may be smaller.
156156

157157

158+
What: /sys/block/<disk>/queue/crypto/
159+
Date: February 2022
160+
Contact: linux-block@vger.kernel.org
161+
Description:
162+
The presence of this subdirectory of /sys/block/<disk>/queue/
163+
indicates that the device supports inline encryption. This
164+
subdirectory contains files which describe the inline encryption
165+
capabilities of the device. For more information about inline
166+
encryption, refer to Documentation/block/inline-encryption.rst.
167+
168+
169+
What: /sys/block/<disk>/queue/crypto/max_dun_bits
170+
Date: February 2022
171+
Contact: linux-block@vger.kernel.org
172+
Description:
173+
[RO] This file shows the maximum length, in bits, of data unit
174+
numbers accepted by the device in inline encryption requests.
175+
176+
177+
What: /sys/block/<disk>/queue/crypto/modes/<mode>
178+
Date: February 2022
179+
Contact: linux-block@vger.kernel.org
180+
Description:
181+
[RO] For each crypto mode (i.e., encryption/decryption
182+
algorithm) the device supports with inline encryption, a file
183+
will exist at this location. It will contain a hexadecimal
184+
number that is a bitmask of the supported data unit sizes, in
185+
bytes, for that crypto mode.
186+
187+
Currently, the crypto modes that may be supported are:
188+
189+
* AES-256-XTS
190+
* AES-128-CBC-ESSIV
191+
* Adiantum
192+
193+
For example, if a device supports AES-256-XTS inline encryption
194+
with data unit sizes of 512 and 4096 bytes, the file
195+
/sys/block/<disk>/queue/crypto/modes/AES-256-XTS will exist and
196+
will contain "0x1200".
197+
198+
199+
What: /sys/block/<disk>/queue/crypto/num_keyslots
200+
Date: February 2022
201+
Contact: linux-block@vger.kernel.org
202+
Description:
203+
[RO] This file shows the number of keyslots the device has for
204+
use with inline encryption.
205+
206+
158207
What: /sys/block/<disk>/queue/dax
159208
Date: June 2016
160209
Contact: linux-block@vger.kernel.org

0 commit comments

Comments
 (0)