Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8952898ybi; Tue, 23 Jul 2019 18:47:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxOtWLSfO+2pQM456ZKQmRfI98Yy3ID5a1FLN+L1p7h1hCTcf3dPkahOYE2MCVIxxHVhp6E X-Received: by 2002:a17:90a:ad86:: with SMTP id s6mr85451010pjq.42.1563932853577; Tue, 23 Jul 2019 18:47:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563932853; cv=none; d=google.com; s=arc-20160816; b=Bx23HR4r0Ar3J/pGhtsMz/GgXtfnxK1OJFA6IMQ7aKFB7bCqBoFfoLgbBSSnILrJ4F P2LBK+wnVS0xhGrhD7v2KeYjwC0XXqL5GVMw7yN8caAYOsItTM/gbPEIsxBA0AVexLmi OXDGoh1N/pIPc0A53bmN5yCT1Rnv30zRlHJcba+WkHlldq5qNEolrXD4IqN9675+dw8w /G0/4ueqxQawAPKbPT+TjuHwxIjpebss2GlKrCb9+lBLjQ1WpeHTr8os2FL9ww7DDAsM VmynwASxAwdcYPiXLYsSUrxgiucdE+i/5p842hn41H9al9S3KaTHt/+pY9xzeruyF/Mn JppQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=cxjj6HCJraV+egdJ+3NbJ1/3TKaPpFlrf63qB3Yr8FE=; b=lhZp6kpb//Ao16azwOP1dEwvBwRk3Hr0EfQfTjAzmx1mJPAM3R77PydQwJWAFNg9yU gGbAmJZmCAG++LWm7b8sROVpdD0e4rnFfDQ45CnYBQeSisZMpFOcBK9ErEvJ2puxqFGn GK3MMn4y22M7OYVpYS9H48/6V3/SBOvJV0cQ/s85SVahbjR5UufC0ns6jnCvEJqXihc3 mKRJl1asiSNj9em6cwS80NWIJ7Fra0HgB8JXLlA9Z+q9dDQjuBn0fRCVqirzAG+X8rvT mteJCCP28CpEv20FAlIShZ7wPxfVPX0D7Y/J1tsj13HPiAmlm0qmNsT14L5etlRmzGxS ON8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 59si13233653plc.425.2019.07.23.18.47.14; Tue, 23 Jul 2019 18:47:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728005AbfGWR6j (ORCPT + 99 others); Tue, 23 Jul 2019 13:58:39 -0400 Received: from mga06.intel.com ([134.134.136.31]:37893 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726513AbfGWR6j (ORCPT ); Tue, 23 Jul 2019 13:58:39 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jul 2019 10:58:39 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,299,1559545200"; d="scan'208";a="160276390" Received: from iweiny-desk2.sc.intel.com ([10.3.52.157]) by orsmga007.jf.intel.com with ESMTP; 23 Jul 2019 10:58:38 -0700 Date: Tue, 23 Jul 2019 10:58:38 -0700 From: Ira Weiny To: Matthew Wilcox Cc: Andrew Morton , linux-mm@kvack.org, Atul Gupta , linux-crypto@vger.kernel.org Subject: Re: [PATCH v2 1/3] mm: Introduce page_size() Message-ID: <20190723175838.GA29729@iweiny-DESK2.sc.intel.com> References: <20190721104612.19120-1-willy@infradead.org> <20190721104612.19120-2-willy@infradead.org> <20190723004307.GB10284@iweiny-DESK2.sc.intel.com> <20190723160248.GK363@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190723160248.GK363@bombadil.infradead.org> User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jul 23, 2019 at 09:02:48AM -0700, Matthew Wilcox wrote: > On Mon, Jul 22, 2019 at 05:43:07PM -0700, Ira Weiny wrote: > > > diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c b/drivers/crypto/chelsio/chtls/chtls_io.c > > > index 551bca6fef24..925be5942895 100644 > > > --- a/drivers/crypto/chelsio/chtls/chtls_io.c > > > +++ b/drivers/crypto/chelsio/chtls/chtls_io.c > > > @@ -1078,7 +1078,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > > > bool merge; > > > > > > if (page) > > > - pg_size <<= compound_order(page); > > > + pg_size = page_size(page); > > > if (off < pg_size && > > > skb_can_coalesce(skb, i, page, off)) { > > > merge = 1; > > > @@ -1105,8 +1105,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > > > __GFP_NORETRY, > > > order); > > > if (page) > > > - pg_size <<= > > > - compound_order(page); > > > + pg_size <<= order; > > > > Looking at the code I see pg_size should be PAGE_SIZE right before this so why > > not just use the new call and remove the initial assignment? > > This driver is really convoluted. Agreed... > > I wasn't certain I wouldn't break it > in some horrid way. I made larger changes to it originally, then they > touched this part of the driver and I had to rework the patch to apply > on top of their changes. So I did something more minimal. > > This, on top of what's in Andrew's tree, would be my guess, but I don't > have the hardware. > > diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c b/drivers/crypto/chelsio/chtls/chtls_io.c > index 925be5942895..d4eb0fcd04c7 100644 > --- a/drivers/crypto/chelsio/chtls/chtls_io.c > +++ b/drivers/crypto/chelsio/chtls/chtls_io.c > @@ -1073,7 +1073,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > } else { > int i = skb_shinfo(skb)->nr_frags; > struct page *page = TCP_PAGE(sk); > - int pg_size = PAGE_SIZE; > + unsigned int pg_size = 0; > int off = TCP_OFF(sk); > bool merge; > > @@ -1092,7 +1092,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > if (page && off == pg_size) { > put_page(page); > TCP_PAGE(sk) = page = NULL; > - pg_size = PAGE_SIZE; > + pg_size = 0; Yea... I was not sure about this one at first... :-/ > } > > if (!page) { > @@ -1104,15 +1104,13 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > __GFP_NOWARN | > __GFP_NORETRY, > order); > - if (page) > - pg_size <<= order; > } > if (!page) { > page = alloc_page(gfp); > - pg_size = PAGE_SIZE; > } > if (!page) > goto wait_for_memory; Side note: why 2 checks for !page? Reviewed-by: Ira Weiny > + pg_size = page_size(page); > off = 0; > } > copy: