From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1A2D915E96 for ; Wed, 31 Jul 2024 16:32:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=54.88.81.56 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722443556; cv=none; b=WmdnZz1oKYa0QDz2gd0i1bN4rfFjWnQbERW4wuzRYXSmWLRXgQXh9Inry0zep+26+pRXPAYqIQW4HoqdkQRmdZFUIMsyJAVYymjiLWqp6qDVA3MO+gefvmLTGkPQ0nwE/AoO0b7yjS7KdP7MO31JowrOarBF4jAO2DtXb3z1OMo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722443556; c=relaxed/simple; bh=xSiBStIp0JfvLhkJ9qgt35kxkKwun1dpgjtrgYfuNHI=; h=References:From:To:Cc:Subject:Date:In-reply-to:Message-ID: MIME-Version:Content-Type; b=MiC3eZzw/bwzOPXmU3sA0kEqzQ0c1rcnTBKsixMoDAUD0pda5lt8873nl2NIq4cpzK5ltRq1g7ZzTX/e8SG2MCgqHZpd4u8DL1AjO0becZSU96aNr1Jj3E6GGrC6KSNEkZ99nr1iXEU5aUwibUs91LE1SBfJ6ylCHA4857NbTN0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=chopps.org; spf=fail smtp.mailfrom=chopps.org; arc=none smtp.client-ip=54.88.81.56 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=chopps.org Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=chopps.org Received: from ja.int.chopps.org.chopps.org (syn-172-222-091-149.res.spectrum.com [172.222.91.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id AF0DD7D052; Wed, 31 Jul 2024 16:32:33 +0000 (UTC) References: <20240714202246.1573817-1-chopps@chopps.org> <20240714202246.1573817-9-chopps@chopps.org> User-agent: mu4e 1.8.14; emacs 28.3 From: Christian Hopps To: Sabrina Dubroca Cc: Christian Hopps , devel@linux-ipsec.org, Steffen Klassert , netdev@vger.kernel.org, Christian Hopps Subject: Re: [PATCH ipsec-next v5 08/17] xfrm: iptfs: add new iptfs xfrm mode impl Date: Wed, 31 Jul 2024 12:29:06 -0400 In-reply-to: Message-ID: Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; format=flowed Sabrina Dubroca writes: > 2024-07-14, 16:22:36 -0400, Christian Hopps wrote: >> +struct xfrm_iptfs_config { >> + u32 pkt_size; /* outer_packet_size or 0 */ > > Please convert this to kdoc. Done. >> +}; >> + >> +struct xfrm_iptfs_data { >> + struct xfrm_iptfs_config cfg; >> + >> + /* Ingress User Input */ >> + struct xfrm_state *x; /* owning state */ > > And this too. Done. >> + u32 payload_mtu; /* max payload size */ >> +}; > > >> +static int iptfs_create_state(struct xfrm_state *x) >> +{ >> + struct xfrm_iptfs_data *xtfs; >> + int err; >> + >> + xtfs = kzalloc(sizeof(*xtfs), GFP_KERNEL); >> + if (!xtfs) >> + return -ENOMEM; >> + >> + err = __iptfs_init_state(x, xtfs); >> + if (err) >> + return err; > > BTW, I wrote that this was leaking xtfs in my previous review, back in > March :/ I went back through your earlier review again. The next patch set adds the queue flush/cleanup on state delete, and uses a new MIB direction independent MIB counter for failed skb alloc -- which you identified as well. Thanks, Chris.