From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id DBABDC54EBD for ; Sat, 7 Jan 2023 01:53:55 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229751AbjAGBxz (ORCPT ); Fri, 6 Jan 2023 20:53:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47252 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236224AbjAGBxv (ORCPT ); Fri, 6 Jan 2023 20:53:51 -0500 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ED8078793F for ; Fri, 6 Jan 2023 17:53:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673056429; x=1704592429; h=date:from:to:cc:subject:in-reply-to:message-id: references:mime-version; bh=tAN3tG4klx6uJOaNR1i4Z8z0U0sej1LXSMPML+feWLA=; b=YlWkXabFGT1VHv3QjmJZjb94ta5w590H/iHkqoHnEK77l+SJTRVU/oXy uMhGh40lovJNP5SHkevoN1Wfst0imCLxdJ1WPyLuMZ3qKjcTAbDwMGIAE HMrGw9OTacu/IonVs6+L19Sa1sHfLdgFnsb+r5RUlGjhsuigXiI76Qo1o +NMcga7LHI5y+3n0pwDnxs84ADJqZXxQjyW0E3eQZBy/CvkG7+jhaov/R hWYja3wI2UHOX4ZlbhYR9fE8yG2BOyaRRseduUmHKRVgE8ApB3vuk74ju LpvT5bvAZwnFcamW+2ixpz7bjz9w80W6YnZ/tWTCbZR1XjM568yOYBqy1 Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10582"; a="302299630" X-IronPort-AV: E=Sophos;i="5.96,307,1665471600"; d="scan'208";a="302299630" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jan 2023 17:53:48 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10582"; a="656115355" X-IronPort-AV: E=Sophos;i="5.96,307,1665471600"; d="scan'208";a="656115355" Received: from rkoganti-mobl.amr.corp.intel.com ([10.209.28.230]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jan 2023 17:53:48 -0800 Date: Fri, 6 Jan 2023 17:53:48 -0800 (PST) From: Mat Martineau To: stable@vger.kernel.org, gregkh@linuxfoundation.org cc: matthieu.baerts@tessares.net, pabeni@redhat.com, mptcp@lists.linux.dev Subject: Re: [PATCH 5.15 0/2] mptcp: use proper req destructor for IPv6 In-Reply-To: <20230107011959.448249-1-mathew.j.martineau@linux.intel.com> Message-ID: References: <20230107011959.448249-1-mathew.j.martineau@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Fri, 6 Jan 2023, Mat Martineau wrote: > Greg - > > Here are backports of two MPTCP patches that recently failed to apply to > the 5.15 stable tree. Two prerequisite patches are already queued in > 5.15.87-rc1: > > mptcp: mark ops structures as ro_after_init > mptcp: remove MPTCP 'ifdef' in TCP SYN cookies > > These patches prevent IPv6 memory leaks with MPTCP. > Sorry about the cut & paste error on the cover letter subject line, was supposed to be "v5.15 stable backports for MPTCP request sock fixes". -- Mat Martineau Intel