From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [91.216.245.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CABF417D6 for ; Sat, 7 Feb 2026 10:39:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.216.245.30 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770460768; cv=none; b=M3m5xii7eAGeHyLdl4a+EbzmyYIR2Fruf483oX1Spx23ofndj+NoSWfYENef/tN5oFAM3C+qsh20Ra4ySk4LJy8h2Sv+JdTWylzd30D3EWOw+1qTfg+7HEtclH7ieriPi/DjXUAJD0bZJLP+hhlmXuk361Yw1K908xfNJ3R2QeE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770460768; c=relaxed/simple; bh=GWJT77GzIXBDylqhuCWi1ijUbwirtIeOU0ugsT1cOdk=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=a20CleBMHjhqCWp2TEwYjBJRQv3+zLXkQzoU3+c2cIWtSsYDcB7Qslj3xz5V1uGPzU8O+0PQa0C+Wgj6nH0X26N9jbFj9u8vs6k9znbhBLWKTPxuqAvxDje0o0RTZYvlxxZqrnDWLHYcrMHlufZ6MavhuTv1x/iqCqLVGDHS8co= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=strlen.de; spf=pass smtp.mailfrom=strlen.de; arc=none smtp.client-ip=91.216.245.30 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=strlen.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=strlen.de Received: by Chamillionaire.breakpoint.cc (Postfix, from userid 1003) id BF75860345; Sat, 07 Feb 2026 11:39:19 +0100 (CET) Date: Sat, 7 Feb 2026 11:39:10 +0100 From: Florian Westphal To: Paolo Abeni Cc: netdev@vger.kernel.org, Steffen Klassert , Herbert Xu , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Simon Horman Subject: Re: [PATCH net-next] xfrm: reduce struct sec_path size Message-ID: References: <83846bd2e3fa08899bd0162e41bfadfec95e82ef.1770398071.git.pabeni@redhat.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <83846bd2e3fa08899bd0162e41bfadfec95e82ef.1770398071.git.pabeni@redhat.com> Paolo Abeni wrote: > The mentioned struct has an hole and uses unnecessary wide type to > store MAC length and indexes of very small arrays. > > It's also embedded into the skb_extensions, and the latter, due > to recent CAN changes, may exceeds the 192 bytes mark (3 cachelines > on x86_64 arch) on some reasonable configurations. > > Reordering and the sec_path fields, shrinking xfrm_offload.orig_mac_len > to 16 bits and xfrm_offload.{len,olen,verified_cnt} to u8, we can save > 16 bytes and keep skb_extensions size under control. Reviewed-by: Florian Westphal