Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp770340imm; Wed, 4 Jul 2018 05:48:39 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc3S0SBArQbwPcBVPvL+KSsHmetBTZoGIIjunZVoVAGR6HF/xoLCZIL9XU8jdtiL/BXhY9B X-Received: by 2002:a17:902:be18:: with SMTP id r24-v6mr847061pls.268.1530708519767; Wed, 04 Jul 2018 05:48:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530708519; cv=none; d=google.com; s=arc-20160816; b=nDOZCDiTxTeqaW95rMd0bfqazBMFOuB+x1Ky+h1wajCjnfpqwkPzXuYs3nzlPrYIlv wHH7/Nr2YXPeNz6558uNyV1Pm3yqPyHHmGn/eeCCoPl1r60wRqnq2ORE5p1TAd+qahlK dHU7JIlDX4fF4NAHXlymyslYCVuLAmfP22EXht+4lKrmQ2pIVSaNPtr11Na2Uwiftv1D 2a6q1fvqPmGAqxPuVEXgCxRe3VTW7fSbK7h3EbnRpMJiLY9R8/v0LmPJj0Zsp/+sqiaM zmqCvv3QAm1DquS199YPwcyQW9zlMf1U0O4J7kV6m1Dc4AcPLXwyOerndWsK9wsR1xcU /+WA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=kgxiVrBvxC7u9t/+OemVR2ZhUOBTX47vreWQ7Ttnrq4=; b=FG7/fYsW3jp+0F3MkXg0Ple1IJdI43wfn+IoqB2HV1KOpznnmCUKtoOzdzbsI/uIa9 BJJtjw9QoLkrSDTLq0dPIkLE2Uy8jHuZKwfsxHm/KU77MNxWQdG18vbKXbHmgfW6Zhpa VctoCWk/hZHs8c23D+wEKcE4fDScjMZ5Kg4PlagNDRMB+6rwipD/JYgVmH1gJ4yUJ6MV 3SNRYxcKCXx0mVNz/SoOHjttA4UbC64RanICuh4IyXCzm5D2GZbJQoU6oogogp6orgTL OEXvvp4cyS4UdkXmWg70lyRDUuVQocgbQJdgirmO8bgabb5aij9BPobEyAg/bYbihZVr LWhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b23-v6si3333653pls.341.2018.07.04.05.48.25; Wed, 04 Jul 2018 05:48:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934646AbeGDMmY (ORCPT + 99 others); Wed, 4 Jul 2018 08:42:24 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:32857 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934481AbeGDMmW (ORCPT ); Wed, 4 Jul 2018 08:42:22 -0400 Received: from dude.hi.pengutronix.de ([2001:67c:670:100:1d::7]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1fah6m-0001dP-Dv; Wed, 04 Jul 2018 14:42:08 +0200 Received: from sha by dude.hi.pengutronix.de with local (Exim 4.91) (envelope-from ) id 1fah6l-0005Z4-G3; Wed, 04 Jul 2018 14:42:07 +0200 From: Sascha Hauer To: linux-mtd@lists.infradead.org Cc: David Gstir , Richard Weinberger , kernel@pengutronix.de, linux-kernel@vger.kernel.org, Sascha Hauer Subject: [PATCH 07/25] ubifs: Store read superblock node Date: Wed, 4 Jul 2018 14:41:19 +0200 Message-Id: <20180704124137.13396-8-s.hauer@pengutronix.de> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180704124137.13396-1-s.hauer@pengutronix.de> References: <20180704124137.13396-1-s.hauer@pengutronix.de> X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::7 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The superblock node is read/modified/written several times throughout the UBIFS code. Instead of reading it from the device each time just keep a copy in memory and write back the modified copy when necessary. This patch helps for authentication support, here we not only have to read the superblock node, but also have to authenticate it, which is easier if we do it once during initialization. Signed-off-by: Sascha Hauer --- fs/ubifs/sb.c | 19 +++++-------------- fs/ubifs/super.c | 8 +------- fs/ubifs/ubifs.h | 3 ++- 3 files changed, 8 insertions(+), 22 deletions(-) diff --git a/fs/ubifs/sb.c b/fs/ubifs/sb.c index a32408f2f5c3..2fabd441d74a 100644 --- a/fs/ubifs/sb.c +++ b/fs/ubifs/sb.c @@ -497,7 +497,7 @@ static int validate_sb(struct ubifs_info *c, struct ubifs_sb_node *sup) * code. Note, the user of this function is responsible of kfree()'ing the * returned superblock buffer. */ -struct ubifs_sb_node *ubifs_read_sb_node(struct ubifs_info *c) +static struct ubifs_sb_node *ubifs_read_sb_node(struct ubifs_info *c) { struct ubifs_sb_node *sup; int err; @@ -554,6 +554,8 @@ int ubifs_read_superblock(struct ubifs_info *c) if (IS_ERR(sup)) return PTR_ERR(sup); + c->superblock = sup; + c->fmt_version = le32_to_cpu(sup->fmt_version); c->ro_compat_version = le32_to_cpu(sup->ro_compat_version); @@ -685,7 +687,6 @@ int ubifs_read_superblock(struct ubifs_info *c) err = validate_sb(c, sup); out: - kfree(sup); return err; } @@ -814,7 +815,7 @@ static int fixup_free_space(struct ubifs_info *c) int ubifs_fixup_free_space(struct ubifs_info *c) { int err; - struct ubifs_sb_node *sup; + struct ubifs_sb_node *sup = c->superblock; ubifs_assert(c->space_fixup); ubifs_assert(!c->ro_mount); @@ -825,16 +826,11 @@ int ubifs_fixup_free_space(struct ubifs_info *c) if (err) return err; - sup = ubifs_read_sb_node(c); - if (IS_ERR(sup)) - return PTR_ERR(sup); - /* Free-space fixup is no longer required */ c->space_fixup = 0; sup->flags &= cpu_to_le32(~UBIFS_FLG_SPACE_FIXUP); err = ubifs_write_sb_node(c, sup); - kfree(sup); if (err) return err; @@ -845,7 +841,7 @@ int ubifs_fixup_free_space(struct ubifs_info *c) int ubifs_enable_encryption(struct ubifs_info *c) { int err; - struct ubifs_sb_node *sup; + struct ubifs_sb_node *sup = c->superblock; if (c->encrypted) return 0; @@ -858,16 +854,11 @@ int ubifs_enable_encryption(struct ubifs_info *c) return -EINVAL; } - sup = ubifs_read_sb_node(c); - if (IS_ERR(sup)) - return PTR_ERR(sup); - sup->flags |= cpu_to_le32(UBIFS_FLG_ENCRYPTION); err = ubifs_write_sb_node(c, sup); if (!err) c->encrypted = 1; - kfree(sup); return err; } diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c index c5466c70d620..9e44baec30a3 100644 --- a/fs/ubifs/super.c +++ b/fs/ubifs/super.c @@ -1580,16 +1580,10 @@ static int ubifs_remount_rw(struct ubifs_info *c) goto out; if (c->old_leb_cnt != c->leb_cnt) { - struct ubifs_sb_node *sup; + struct ubifs_sb_node *sup = c->superblock; - sup = ubifs_read_sb_node(c); - if (IS_ERR(sup)) { - err = PTR_ERR(sup); - goto out; - } sup->leb_cnt = cpu_to_le32(c->leb_cnt); err = ubifs_write_sb_node(c, sup); - kfree(sup); if (err) goto out; } diff --git a/fs/ubifs/ubifs.h b/fs/ubifs/ubifs.h index 83c5e75ed3b6..92574045e030 100644 --- a/fs/ubifs/ubifs.h +++ b/fs/ubifs/ubifs.h @@ -971,6 +971,7 @@ struct ubifs_debug_info; * struct ubifs_info - UBIFS file-system description data structure * (per-superblock). * @vfs_sb: VFS @struct super_block object + * @superblock: The super block node as read from the device * * @highest_inum: highest used inode number * @max_sqnum: current global sequence number @@ -1217,6 +1218,7 @@ struct ubifs_debug_info; */ struct ubifs_info { struct super_block *vfs_sb; + struct ubifs_sb_node *superblock; ino_t highest_inum; unsigned long long max_sqnum; @@ -1647,7 +1649,6 @@ int ubifs_write_master(struct ubifs_info *c); /* sb.c */ int ubifs_read_superblock(struct ubifs_info *c); -struct ubifs_sb_node *ubifs_read_sb_node(struct ubifs_info *c); int ubifs_write_sb_node(struct ubifs_info *c, struct ubifs_sb_node *sup); int ubifs_fixup_free_space(struct ubifs_info *c); int ubifs_enable_encryption(struct ubifs_info *c); -- 2.18.0