@@ -461,7 +461,7 @@ int ecryptfs_encrypt_page(struct folio *folio)
461
461
462
462
/**
463
463
* ecryptfs_decrypt_page
464
- * @page: Page mapped from the eCryptfs inode for the file; data read
464
+ * @folio: Folio mapped from the eCryptfs inode for the file; data read
465
465
* and decrypted from the lower file will be written into this
466
466
* page
467
467
*
@@ -475,7 +475,7 @@ int ecryptfs_encrypt_page(struct folio *folio)
475
475
*
476
476
* Returns zero on success; negative on error
477
477
*/
478
- int ecryptfs_decrypt_page (struct page * page )
478
+ int ecryptfs_decrypt_page (struct folio * folio )
479
479
{
480
480
struct inode * ecryptfs_inode ;
481
481
struct ecryptfs_crypt_stat * crypt_stat ;
@@ -484,13 +484,13 @@ int ecryptfs_decrypt_page(struct page *page)
484
484
loff_t lower_offset ;
485
485
int rc = 0 ;
486
486
487
- ecryptfs_inode = page -> mapping -> host ;
487
+ ecryptfs_inode = folio -> mapping -> host ;
488
488
crypt_stat =
489
489
& (ecryptfs_inode_to_private (ecryptfs_inode )-> crypt_stat );
490
490
BUG_ON (!(crypt_stat -> flags & ECRYPTFS_ENCRYPTED ));
491
491
492
- lower_offset = lower_offset_for_page (crypt_stat , page );
493
- page_virt = kmap_local_page ( page );
492
+ lower_offset = lower_offset_for_page (crypt_stat , & folio -> page );
493
+ page_virt = kmap_local_folio ( folio , 0 );
494
494
rc = ecryptfs_read_lower (page_virt , lower_offset , PAGE_SIZE ,
495
495
ecryptfs_inode );
496
496
kunmap_local (page_virt );
@@ -504,6 +504,7 @@ int ecryptfs_decrypt_page(struct page *page)
504
504
for (extent_offset = 0 ;
505
505
extent_offset < (PAGE_SIZE / crypt_stat -> extent_size );
506
506
extent_offset ++ ) {
507
+ struct page * page = folio_page (folio , 0 );
507
508
rc = crypt_extent (crypt_stat , page , page ,
508
509
extent_offset , DECRYPT );
509
510
if (rc ) {
0 commit comments