From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: pull request (net-next): ipsec-next 2018-10-18 Date: Thu, 18 Oct 2018 09:58:15 -0700 (PDT) Message-ID: <20181018.095815.1305578557308285809.davem@davemloft.net> References: <20181018105654.32149-1-steffen.klassert@secunet.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: herbert@gondor.apana.org.au, netdev@vger.kernel.org To: steffen.klassert@secunet.com Return-path: Received: from shards.monkeyblade.net ([23.128.96.9]:36662 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727754AbeJSBAH (ORCPT ); Thu, 18 Oct 2018 21:00:07 -0400 In-Reply-To: <20181018105654.32149-1-steffen.klassert@secunet.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Steffen Klassert Date: Thu, 18 Oct 2018 12:56:51 +0200 > 1) Remove an unnecessary dev->tstats check in xfrmi_get_stats64. > From Li RongQing. > > 2) We currently do a sizeof(element) instead of a sizeof(array) > check when initializing the ovec array of the secpath. > Currently this array can have only one element, so code is > OK but error-prone. Change this to do a sizeof(array) > check so that we can add more elements in future. > From Li RongQing. > > 3) Improve xfrm IPv6 address hashing by using the complete IPv6 > addresses for a hash. From Michal Kubecek. > > Please pull or let me know if there are problems. Also pulled, thank you.