]>
Commit | Line | Data |
---|---|---|
0a2e4279 ŁK |
1 | dm-crypt: remove io_pool |
2 | ||
3 | Remove io_pool and _crypt_io_pool because they are unused. | |
4 | ||
5 | Signed-off-by: Mikulas Patocka <mpatocka@redhat.com> | |
6 | ||
7 | --- | |
8 | drivers/md/dm-crypt.c | 21 +-------------------- | |
9 | 1 file changed, 1 insertion(+), 20 deletions(-) | |
10 | ||
11 | Index: linux-3.14/drivers/md/dm-crypt.c | |
12 | =================================================================== | |
13 | --- linux-3.14.orig/drivers/md/dm-crypt.c 2014-04-04 21:04:40.000000000 +0200 | |
14 | +++ linux-3.14/drivers/md/dm-crypt.c 2014-04-04 21:05:40.000000000 +0200 | |
15 | @@ -120,7 +120,6 @@ struct crypt_config { | |
16 | * pool for per bio private data, crypto requests and | |
17 | * encryption requeusts/buffer pages | |
18 | */ | |
19 | - mempool_t *io_pool; | |
20 | mempool_t *req_pool; | |
21 | mempool_t *page_pool; | |
22 | struct bio_set *bs; | |
23 | @@ -173,8 +172,6 @@ struct crypt_config { | |
24 | ||
25 | #define MIN_IOS 16 | |
26 | ||
27 | -static struct kmem_cache *_crypt_io_pool; | |
28 | - | |
29 | static void clone_init(struct dm_crypt_io *, struct bio *); | |
30 | static void kcryptd_queue_crypt(struct dm_crypt_io *io); | |
31 | static u8 *iv_of_dmreq(struct crypt_config *cc, struct dm_crypt_request *dmreq); | |
32 | @@ -1061,8 +1058,6 @@ static void crypt_dec_pending(struct dm_ | |
33 | ||
34 | if (io->ctx.req) | |
35 | crypt_free_req(cc, io->ctx.req, base_bio); | |
36 | - if (io != dm_per_bio_data(base_bio, cc->per_bio_data_size)) | |
37 | - mempool_free(io, cc->io_pool); | |
38 | ||
39 | bio_endio(base_bio, error); | |
40 | } | |
41 | @@ -1450,8 +1445,6 @@ static void crypt_dtr(struct dm_target * | |
42 | mempool_destroy(cc->page_pool); | |
43 | if (cc->req_pool) | |
44 | mempool_destroy(cc->req_pool); | |
45 | - if (cc->io_pool) | |
46 | - mempool_destroy(cc->io_pool); | |
47 | ||
48 | if (cc->iv_gen_ops && cc->iv_gen_ops->dtr) | |
49 | cc->iv_gen_ops->dtr(cc); | |
c0841977 | 50 | @@ -1658,13 +1658,6 @@ |
0a2e4279 ŁK |
51 | if (ret < 0) |
52 | goto bad; | |
53 | ||
54 | - ret = -ENOMEM; | |
55 | - cc->io_pool = mempool_create_slab_pool(MIN_IOS, _crypt_io_pool); | |
56 | - if (!cc->io_pool) { | |
57 | - ti->error = "Cannot allocate crypt io mempool"; | |
58 | - goto bad; | |
59 | - } | |
60 | - | |
61 | cc->dmreq_start = sizeof(struct ablkcipher_request); | |
62 | cc->dmreq_start += crypto_ablkcipher_reqsize(any_tfm(cc)); | |
c0841977 ŁK |
63 | cc->dmreq_start = ALIGN(cc->dmreq_start, __alignof__(struct dm_crypt_request)); |
64 | @@ -1682,6 +1675,7 @@ | |
65 | iv_size_padding = crypto_ablkcipher_alignmask(any_tfm(cc)); | |
66 | } | |
0a2e4279 ŁK |
67 | |
68 | + ret = -ENOMEM; | |
69 | cc->req_pool = mempool_create_kmalloc_pool(MIN_IOS, cc->dmreq_start + | |
c0841977 | 70 | sizeof(struct dm_crypt_request) + iv_size_padding + cc->iv_size); |
0a2e4279 ŁK |
71 | if (!cc->req_pool) { |
72 | @@ -1938,14 +1925,9 @@ static int __init dm_crypt_init(void) | |
73 | { | |
74 | int r; | |
75 | ||
76 | - _crypt_io_pool = KMEM_CACHE(dm_crypt_io, 0); | |
77 | - if (!_crypt_io_pool) | |
78 | - return -ENOMEM; | |
79 | - | |
80 | r = dm_register_target(&crypt_target); | |
81 | if (r < 0) { | |
82 | DMERR("register failed %d", r); | |
83 | - kmem_cache_destroy(_crypt_io_pool); | |
84 | } | |
85 | ||
86 | return r; | |
87 | @@ -1954,7 +1936,6 @@ static int __init dm_crypt_init(void) | |
88 | static void __exit dm_crypt_exit(void) | |
89 | { | |
90 | dm_unregister_target(&crypt_target); | |
91 | - kmem_cache_destroy(_crypt_io_pool); | |
92 | } | |
93 | ||
94 | module_init(dm_crypt_init); |