Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp1798799ybj; Sun, 22 Sep 2019 12:10:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqxwK7a1e3FZQRzRqtxO0UV3Fy3vYmGnY6SiUM60dZGXfWPC4wtqil0tD56ZiNCORasFTCYR X-Received: by 2002:a17:906:3db2:: with SMTP id y18mr26328593ejh.68.1569179421536; Sun, 22 Sep 2019 12:10:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569179421; cv=none; d=google.com; s=arc-20160816; b=Ky7VIlk48buioyMnNJSasEj5ox6IzsX2iQw2mg61emcFxUJk8LTTURBm6mq43KhrB2 uj0ffvy41dB0vqbuwAjX/RSS1kEAykKCzGUKzmKNoHPW4HvtixZkzeRF54ANs5MCGmFT BX91h+XgnI7l1EDK04ybyXZyFkzLAvdM4XawqMWB2Nm5sqGN/bGZULtz4eOXOH19kEyU nrxGzbqLta3j+KZXSG8lZkiNm55KPKy3nJOBWf4bDJqgdK5xcOSnk+UWSTG4RjAPhjc0 erSrYD0G2uEuCdtctxvU0CV0nDsQeWvdqk5HMk088AJ37GWEYpbTYuDaIrz29EpGErrx DmiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=lburIxzbeyHgfo9yMbsVWcfzebrTr95qcdgj0C2VBgo=; b=Il1+eJIyLUWfWKA412/GLrDRY9quB7GFp+ulLU0VKpZVEFAWnPAMU+kq28ixSCBgts anbzCm2KYGzNSq6VIHOOQ/j4UcCyN9GqqZ0QVIIWY7YWpU/9NIradCxAEgNOlF3j98Xo yK2o41RFwzGQPRbQgRfYS3S/EhfNvu84PDKLmelZrZPH4mI3QSuctv0apIRboEjcGFDR +SYEYPis6kr0iUPcQmF75Y+86KmFBC2Z/GPqjU49uXWFCoMUiZEvjo59g26hDUNJyZiM ItMiJ6bD/PTNw3LennjGKMDVbFsiRhUZ0G44y6j0UQDvL/OkWmNatiCiJdpu75YGI8nm F2aQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dXI923zm; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y7si3924084ejp.378.2019.09.22.12.09.56; Sun, 22 Sep 2019 12:10:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dXI923zm; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404757AbfITX2u (ORCPT + 99 others); Fri, 20 Sep 2019 19:28:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:45934 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404621AbfITX2u (ORCPT ); Fri, 20 Sep 2019 19:28:50 -0400 Received: from localhost.localdomain (c-73-223-200-170.hsd1.ca.comcast.net [73.223.200.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EDB4A2070C; Fri, 20 Sep 2019 23:28:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569022129; bh=CAbZ84WKONW+t7eKvZY0iLJYWWpttBNaUPe/GI/2yAM=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=dXI923zm3OtD0Z4zZt3Mba+OlKgyAYmkUUUmoBl6FdLxtazIPu7a2BStL3Ljd3tsD RXuuP8w5HADP9/cQKuPHCaLWSchZAwT0v54gLCvsFgELITS9deTHMvnmVH9dO4zFkB 3FStVq/pqxfv294BugLGDU3RTz7GPPkJS+25D5WA= Date: Fri, 20 Sep 2019 16:28:48 -0700 From: Andrew Morton To: Matthew Wilcox Cc: Ira Weiny , linux-mm@kvack.org, Atul Gupta , linux-crypto@vger.kernel.org Subject: Re: [PATCH v2 1/3] mm: Introduce page_size() Message-Id: <20190920162848.950dd70264e670a485f410dc@linux-foundation.org> In-Reply-To: <20190723160248.GK363@bombadil.infradead.org> References: <20190721104612.19120-1-willy@infradead.org> <20190721104612.19120-2-willy@infradead.org> <20190723004307.GB10284@iweiny-DESK2.sc.intel.com> <20190723160248.GK363@bombadil.infradead.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, 23 Jul 2019 09:02:48 -0700 Matthew Wilcox wrote: > On Mon, Jul 22, 2019 at 05:43:07PM -0700, Ira Weiny wrote: > > > diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c b/drivers/crypto/chelsio/chtls/chtls_io.c > > > index 551bca6fef24..925be5942895 100644 > > > --- a/drivers/crypto/chelsio/chtls/chtls_io.c > > > +++ b/drivers/crypto/chelsio/chtls/chtls_io.c > > > @@ -1078,7 +1078,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > > > bool merge; > > > > > > if (page) > > > - pg_size <<= compound_order(page); > > > + pg_size = page_size(page); > > > if (off < pg_size && > > > skb_can_coalesce(skb, i, page, off)) { > > > merge = 1; > > > @@ -1105,8 +1105,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > > > __GFP_NORETRY, > > > order); > > > if (page) > > > - pg_size <<= > > > - compound_order(page); > > > + pg_size <<= order; > > > > Looking at the code I see pg_size should be PAGE_SIZE right before this so why > > not just use the new call and remove the initial assignment? > > This driver is really convoluted. I wasn't certain I wouldn't break it > in some horrid way. I made larger changes to it originally, then they > touched this part of the driver and I had to rework the patch to apply > on top of their changes. So I did something more minimal. > > This, on top of what's in Andrew's tree, would be my guess, but I don't > have the hardware. > > diff --git a/drivers/crypto/chelsio/chtls/chtls_io.c b/drivers/crypto/chelsio/chtls/chtls_io.c > index 925be5942895..d4eb0fcd04c7 100644 > --- a/drivers/crypto/chelsio/chtls/chtls_io.c > +++ b/drivers/crypto/chelsio/chtls/chtls_io.c > @@ -1073,7 +1073,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > } else { > int i = skb_shinfo(skb)->nr_frags; > struct page *page = TCP_PAGE(sk); > - int pg_size = PAGE_SIZE; > + unsigned int pg_size = 0; > int off = TCP_OFF(sk); > bool merge; > > @@ -1092,7 +1092,7 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > if (page && off == pg_size) { > put_page(page); > TCP_PAGE(sk) = page = NULL; > - pg_size = PAGE_SIZE; > + pg_size = 0; > } > > if (!page) { > @@ -1104,15 +1104,13 @@ int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size) > __GFP_NOWARN | > __GFP_NORETRY, > order); > - if (page) > - pg_size <<= order; > } > if (!page) { > page = alloc_page(gfp); > - pg_size = PAGE_SIZE; > } > if (!page) > goto wait_for_memory; > + pg_size = page_size(page); > off = 0; > } I didn't do anything with this. I assume the original patch (which has been in -next since July 22) is good and the above is merely a cleanup?