From nobody Mon Apr 6 21:32:22 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 22769ECAAD3 for ; Thu, 1 Sep 2022 16:07:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234833AbiIAQHO (ORCPT ); Thu, 1 Sep 2022 12:07:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32948 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232539AbiIAQHL (ORCPT ); Thu, 1 Sep 2022 12:07:11 -0400 Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com [IPv6:2a00:1450:4864:20::630]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 81CC769F7F; Thu, 1 Sep 2022 09:07:10 -0700 (PDT) Received: by mail-ej1-x630.google.com with SMTP id h5so24144286ejb.3; Thu, 01 Sep 2022 09:07:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc; bh=4VJruaNQlZmfFLkd95beZGUr5mHEF8CKOi+WYXEPPvs=; b=Fc9a+A93csieHGq1JI6Kclyd+05dfVZT4wh3OXLyclKdraGurGth6aDwWkP66LLuE4 EFuc1WXKF5EJhOLZQak6b9BhwOOvG9yvNyNweg5Q6VZbSp896tkIID91uhfVDaoMjdJk QNgnMnIBaal28BcAGBRnk/q0tETYaJSYaVSRVWDEeyx+9lGijs7NgZIWJ21iYW8BValE uJJa7U0dcEiKGUIvYKd1QIEMxMK401gcKlMX+/WZxIRQ95osG5Gi0J8sI0pMfpFYFPUl Z/qU29AAutEwvEVmSISGJAsb1FNuBHWYYhxTc4NvHyGoUiWLABJvcby7RTP7PlUjLfMD zvzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc; bh=4VJruaNQlZmfFLkd95beZGUr5mHEF8CKOi+WYXEPPvs=; b=eOkEWga2iqQUlF5ZycwDTT6Uo7ijQNpUGT4vY+cguYsoDIXRi0W7A9TrG7NpAka2Q1 YBxqwsyBp73e2Cn3i7DuE+00mZUPNmourCuUrJm+cVT8XhLbil3E59XoM0bv6rrkfhDA FYedEXUc9OCTCWE3vUlyZtCI47yVmj+H7vzGvYkLyATry2GpvJuWIJxDjrp3yuKQch+3 3gQNFfc/YZX1yDOUjGspMWyFDutTrTEAECJihmruZfI95cIfZCBK6ZhcmllJLpkadvJG mLqday6vTJez0hzzNkrAb1sGn/qXSmocitmCJCH4xQVvzWlQqWMizZNxPzBRmgctdEB9 06aw== X-Gm-Message-State: ACgBeo0rW95SFYOq750CuVcy/V8daehSkYGQsWINFOyfwINs0z7XTHvt FfrNDCnkU60iX6/2/mpB5t4= X-Google-Smtp-Source: AA6agR5uwHLhnuKmevtAHZVuEceRTbDEBvGkVKoPnf9uEBY1ROs9QTnNRuwVR20o1fhszYsOdw1D0Q== X-Received: by 2002:a17:907:2bc7:b0:73d:d239:110b with SMTP id gv7-20020a1709072bc700b0073dd239110bmr23998582ejc.752.1662048428975; Thu, 01 Sep 2022 09:07:08 -0700 (PDT) Received: from localhost.localdomain (host-87-1-103-238.retail.telecomitalia.it. [87.1.103.238]) by smtp.gmail.com with ESMTPSA id q27-20020a50c35b000000b0043cf2e0ce1csm1613771edb.48.2022.09.01.09.07.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Sep 2022 09:07:07 -0700 (PDT) From: "Fabio M. De Francesco" To: Tyler Hicks , Christian Brauner , Seth Forshee , Amir Goldstein , "Matthew Wilcox (Oracle)" , Damien Le Moal , Andrew Morton , Roman Gushchin , "Theodore Ts'o" , Muchun Song , ecryptfs@vger.kernel.org, linux-kernel@vger.kernel.org Cc: "Fabio M. De Francesco" , "Venkataramanan, Anirudh" , Ira Weiny Subject: [RESEND PATCH] ecryptfs: Replace kmap() with kmap_local_page() Date: Thu, 1 Sep 2022 18:07:04 +0200 Message-Id: <20220901160704.25701-1-fmdefrancesco@gmail.com> X-Mailer: git-send-email 2.37.2 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The use of kmap() is being deprecated in favor of kmap_local_page(). There are two main problems with kmap(): (1) It comes with an overhead as the mapping space is restricted and protected by a global lock for synchronization and (2) it also requires global TLB invalidation when the kmap=E2=80=99s pool wraps and it might block when the mapping space is fully utilized until a slot becomes available. With kmap_local_page() the mappings are per thread, CPU local, can take page faults, and can be called from any context (including interrupts). It is faster than kmap() in kernels with HIGHMEM enabled. Furthermore, the tasks can be preempted and, when they are scheduled to run again, the kernel virtual addresses are restored and still valid. Since its use in fs/ecryptfs is safe everywhere, it should be preferred. Therefore, replace kmap() with kmap_local_page() in fs/ecryptfs. Cc: "Venkataramanan, Anirudh" Suggested-by: Ira Weiny Reviewed-by: Ira Weiny Signed-off-by: Fabio M. De Francesco --- I'm resending this patch because some recipients were missing in the previous submission. In the meantime I'm also adding some more information in the commit message. There are no changes in the code. fs/ecryptfs/crypto.c | 8 ++++---- fs/ecryptfs/read_write.c | 8 ++++---- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index e3f5d7f3c8a0..03263ebcccc6 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c @@ -465,10 +465,10 @@ int ecryptfs_encrypt_page(struct page *page) } =20 lower_offset =3D lower_offset_for_page(crypt_stat, page); - enc_extent_virt =3D kmap(enc_extent_page); + enc_extent_virt =3D kmap_local_page(enc_extent_page); rc =3D ecryptfs_write_lower(ecryptfs_inode, enc_extent_virt, lower_offset, PAGE_SIZE); - kunmap(enc_extent_page); + kunmap_local(enc_extent_virt); if (rc < 0) { ecryptfs_printk(KERN_ERR, "Error attempting to write lower page; rc =3D [%d]\n", @@ -514,10 +514,10 @@ int ecryptfs_decrypt_page(struct page *page) BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)); =20 lower_offset =3D lower_offset_for_page(crypt_stat, page); - page_virt =3D kmap(page); + page_virt =3D kmap_local_page(page); rc =3D ecryptfs_read_lower(page_virt, lower_offset, PAGE_SIZE, ecryptfs_inode); - kunmap(page); + kunmap_local(page_virt); if (rc < 0) { ecryptfs_printk(KERN_ERR, "Error attempting to read lower page; rc =3D [%d]\n", diff --git a/fs/ecryptfs/read_write.c b/fs/ecryptfs/read_write.c index 60bdcaddcbe5..5edf027c8359 100644 --- a/fs/ecryptfs/read_write.c +++ b/fs/ecryptfs/read_write.c @@ -64,11 +64,11 @@ int ecryptfs_write_lower_page_segment(struct inode *ecr= yptfs_inode, =20 offset =3D ((((loff_t)page_for_lower->index) << PAGE_SHIFT) + offset_in_page); - virt =3D kmap(page_for_lower); + virt =3D kmap_local_page(page_for_lower); rc =3D ecryptfs_write_lower(ecryptfs_inode, virt, offset, size); if (rc > 0) rc =3D 0; - kunmap(page_for_lower); + kunmap_local(virt); return rc; } =20 @@ -253,11 +253,11 @@ int ecryptfs_read_lower_page_segment(struct page *pag= e_for_ecryptfs, int rc; =20 offset =3D ((((loff_t)page_index) << PAGE_SHIFT) + offset_in_page); - virt =3D kmap(page_for_ecryptfs); + virt =3D kmap_local_page(page_for_ecryptfs); rc =3D ecryptfs_read_lower(virt, offset, size, ecryptfs_inode); if (rc > 0) rc =3D 0; - kunmap(page_for_ecryptfs); + kunmap_local(virt); flush_dcache_page(page_for_ecryptfs); return rc; } --=20 2.37.2