From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6EB32C5479D for ; Sat, 7 Jan 2023 01:20:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229542AbjAGBUK (ORCPT ); Fri, 6 Jan 2023 20:20:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38666 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231394AbjAGBUJ (ORCPT ); Fri, 6 Jan 2023 20:20:09 -0500 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 47A686A0D6 for ; Fri, 6 Jan 2023 17:20:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673054408; x=1704590408; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=bbtqqF+B69tHNesf0wgtgTqkjy1s0lJrqw2if/BTft4=; b=gYi+1S0JRx/2JFM1ODoSKVL7fDDiolwyF2jt6JcAYx8FoojYiBJuAbJI 0cui8nn7x+BVNvJUd52diJOnoSxKsagPS8Ux9nTo/CGA9AY27XsfyXgwG QKZZY/w8Qy3fCCTYIEvS0W/uR3+FDsH0e68iiB9RkXpZaVyzu1ocgn5Fi +T0tqfP6e+qVsIpaR0XbvPjBoR6cINPU95NggqzQ5FuJoNZUNiBpVzY/X S4GnCipawuXz1aDAtFe9dxW/favyHhPOR3qu3hw1kEosfKy5TjvvtCIui dWkf++roBYrHiV08UXbMkydIP346/eEDJ7yEKDCmJgMaQaOyn8uQMfJTG A==; X-IronPort-AV: E=McAfee;i="6500,9779,10582"; a="322672293" X-IronPort-AV: E=Sophos;i="5.96,307,1665471600"; d="scan'208";a="322672293" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jan 2023 17:20:07 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10582"; a="649475308" X-IronPort-AV: E=Sophos;i="5.96,307,1665471600"; d="scan'208";a="649475308" Received: from mechevar-mobl.amr.corp.intel.com (HELO mjmartin-desk2.intel.com) ([10.209.66.63]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jan 2023 17:20:07 -0800 From: Mat Martineau To: stable@vger.kernel.org, gregkh@linuxfoundation.org Cc: Mat Martineau , matthieu.baerts@tessares.net, pabeni@redhat.com, mptcp@lists.linux.dev Subject: [PATCH 5.15 0/2] mptcp: use proper req destructor for IPv6 Date: Fri, 6 Jan 2023 17:19:56 -0800 Message-Id: <20230107011959.448249-1-mathew.j.martineau@linux.intel.com> X-Mailer: git-send-email 2.39.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Greg - Here are backports of two MPTCP patches that recently failed to apply to the 5.15 stable tree. Two prerequisite patches are already queued in 5.15.87-rc1: mptcp: mark ops structures as ro_after_init mptcp: remove MPTCP 'ifdef' in TCP SYN cookies These patches prevent IPv6 memory leaks with MPTCP. Thanks! Matthieu Baerts (2): mptcp: dedicated request sock for subflow in v6 mptcp: use proper req destructor for IPv6 net/mptcp/subflow.c | 53 +++++++++++++++++++++++++++++++++++---------- 1 file changed, 42 insertions(+), 11 deletions(-) -- 2.39.0