blk-crypto: remove blk_crypto_insert_cloned_request()
authorEric Biggers <ebiggers@google.com>
Wed, 15 Mar 2023 18:39:05 +0000 (11:39 -0700)
committerJens Axboe <axboe@kernel.dk>
Thu, 16 Mar 2023 15:35:09 +0000 (09:35 -0600)
blk_crypto_insert_cloned_request() is the same as
blk_crypto_rq_get_keyslot(), so just use that directly.

Signed-off-by: Eric Biggers <ebiggers@google.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Link: https://lore.kernel.org/r/20230315183907.53675-2-ebiggers@kernel.org
Signed-off-by: Jens Axboe <axboe@kernel.dk>
Documentation/block/inline-encryption.rst
block/blk-crypto-internal.h
block/blk-mq.c

index f9bf18ea6509319fc8f4b1f269d4afe417525e6d..90b733422ed46a73975c702a1d85818f39b50e41 100644 (file)
@@ -270,8 +270,7 @@ Request queue based layered devices like dm-rq that wish to support inline
 encryption need to create their own blk_crypto_profile for their request_queue,
 and expose whatever functionality they choose. When a layered device wants to
 pass a clone of that request to another request_queue, blk-crypto will
-initialize and prepare the clone as necessary; see
-``blk_crypto_insert_cloned_request()``.
+initialize and prepare the clone as necessary.
 
 Interaction between inline encryption and blk integrity
 =======================================================
index 4f1de2495f0c391aa2d62701761de7610e1acab3..93a141979694b0e39ffe3d5bcaf7a06c7ba79eff 100644 (file)
@@ -205,21 +205,6 @@ static inline int blk_crypto_rq_bio_prep(struct request *rq, struct bio *bio,
        return 0;
 }
 
-/**
- * blk_crypto_insert_cloned_request - Prepare a cloned request to be inserted
- *                                   into a request queue.
- * @rq: the request being queued
- *
- * Return: BLK_STS_OK on success, nonzero on error.
- */
-static inline blk_status_t blk_crypto_insert_cloned_request(struct request *rq)
-{
-
-       if (blk_crypto_rq_is_encrypted(rq))
-               return blk_crypto_rq_get_keyslot(rq);
-       return BLK_STS_OK;
-}
-
 #ifdef CONFIG_BLK_INLINE_ENCRYPTION_FALLBACK
 
 int blk_crypto_fallback_start_using_mode(enum blk_crypto_mode_num mode_num);
index 49825538d932d75869d7dc1a6d57c6415166aa9d..5e819de2f5e7028de4f2c24d8f0433a28109de62 100644 (file)
@@ -3049,7 +3049,7 @@ blk_status_t blk_insert_cloned_request(struct request *rq)
        if (q->disk && should_fail_request(q->disk->part0, blk_rq_bytes(rq)))
                return BLK_STS_IOERR;
 
-       if (blk_crypto_insert_cloned_request(rq))
+       if (blk_crypto_rq_get_keyslot(rq))
                return BLK_STS_IOERR;
 
        blk_account_io_start(rq);