From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: pull request (net-next): ipsec-next 2018-03-29 Date: Thu, 29 Mar 2018 11:23:23 -0400 (EDT) Message-ID: <20180329.112323.723010861462079008.davem@davemloft.net> References: <20180329072549.2880-1-steffen.klassert@secunet.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: herbert@gondor.apana.org.au, netdev@vger.kernel.org To: steffen.klassert@secunet.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:44564 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750979AbeC2PYL (ORCPT ); Thu, 29 Mar 2018 11:24:11 -0400 In-Reply-To: <20180329072549.2880-1-steffen.klassert@secunet.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Steffen Klassert Date: Thu, 29 Mar 2018 09:25:45 +0200 > 1) Remove a redundant pointer initialization esp_input_set_header(). > From Colin Ian King. > > 2) Mark the xfrm kmem_caches as __ro_after_init. > From Alexey Dobriyan. > > 3) Do the checksum for an ipsec offlad packet in software > if the device does not advertise NETIF_F_HW_ESP_TX_CSUM. > From Shannon Nelson. > > 4) Use booleans for true and false instead of integers > in xfrm_policy_cache_flush(). > From Gustavo A. R. Silva > > Please pull or let me know if there are problems. Also pulled, thank you.