Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp3058937rdb; Tue, 26 Dec 2023 14:40:43 -0800 (PST) X-Google-Smtp-Source: AGHT+IHiahnaSkQrOOQhZjmAWuqhxaXY7C/5NUMw6GiWCH0bVWQAeTuvJRApllsYk6ozUm+1ZBoR X-Received: by 2002:a17:906:103:b0:a23:8929:97cf with SMTP id 3-20020a170906010300b00a23892997cfmr3716874eje.8.1703630443014; Tue, 26 Dec 2023 14:40:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703630443; cv=none; d=google.com; s=arc-20160816; b=TuZeySiFcHn2pNQpi3l1fE06CJtZkrRW663LR0g4n4qoIvkvzYf48Vbqh3Fz62BAZI rtOF6abJM1V0B+H+xcpNdqmKLKiYp8O9DyvsfXh7kW50VmWj0D+qheCViCJh0SCsQqtS VT4vngGMkoxi6pJXQ937PVclQhlPN3zY7DRi0Kti8tRVgoPU43jUN8vrvcYnDUx0meAz VE4iqVsQtQM60ILO3Ahd57Fd/RcPIIVIZDBI+08qC9fl/ihqPYgMQSG8sfUB0dTgXNjL Q9DqxsdZrjDEQFE62ASDvODPj9/nHGcfkZaZGa3EdMlZpl0pMgCweQAMsuqP0Dv88Lr/ cH8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:date:message-id:from:subject :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=nHdxqoDwjSeLruHRkmloRuWbQGpE5ajceaZJh5GpRjM=; fh=BRXSLER3NppImXDDDBixenHYJXq4iLWo+thbIoQaoZk=; b=IsK+Nlk4zdtlIGXwzlzuYPYSh0LPXQ1ZwyE3nIBpELPHsu0Siki6jR7L5gS5iSzbCU 8RRNGM5zwU18q4Cw+EgCDWuIRCAT4ubFujGlHl/0FNvBxukUIaz3bhpRHAF7mwq1+pG0 8c0O9MMrYzjcZzZnFzuj23LHd8aR19tnq1jl0hzhwEc6VcKrxpwqNH5JixV5YcWbR1im ky8ja1H4wc+yJtUCaLd8KRcQz8gEbo/Au7wTjrCoQpYoECB812o+g9Ji5jr6f+BBAEBk Nhe4y4bA9Xz+KW0Qx0D8n+BTwZKQs8adZGSDQV6/a1TAksPF1z6BUq9MiMa5Ve5+5o82 kSSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=F8OOMrMZ; spf=pass (google.com: domain of linux-kernel+bounces-11710-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-11710-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id dx2-20020a170906a84200b00a1d83dbee15si5690168ejb.314.2023.12.26.14.40.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Dec 2023 14:40:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-11710-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=F8OOMrMZ; spf=pass (google.com: domain of linux-kernel+bounces-11710-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-11710-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id C01491F21881 for ; Tue, 26 Dec 2023 22:40:42 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 59C03F4F8; Tue, 26 Dec 2023 22:40:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="F8OOMrMZ" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 82A6A5250; Tue, 26 Dec 2023 22:40:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id E6948C433C9; Tue, 26 Dec 2023 22:40:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1703630424; bh=t7Azjows6a4NudAwFasVutuu3ZSXugHqZpvg/vQupZc=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=F8OOMrMZQGGkH81i5df0nHGftbOQDJVEAKb7h6LP/qJoTLvXbzKER+k1mHuX+YvGY fGVNCVAvEu1bpRVlgdpVZMR40XZBr06aQQ8F8EWjWRfojb5kcegjcX07jsH29G8JLb j5C3fHXQiS0kvCGuuYdG04eZUwXFXivizYewXR9ZNDY6SgNQlq9zAeqQRUxdOczrLC RA5FcUAW4Obt0yRFn5TwL+c7TayE8Kjze7Fl04+rkib6ommYoauqqbkmbit8hsbf3f Cp+sO4SDRN9MAagAPj0hqjWVk6otsm7FnHJD2WerJ0WHKU7nvbX20Q4anfmx1MAl4O hNEpVNxlaeNjg== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id CC014E333D7; Tue, 26 Dec 2023 22:40:23 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH net-next 0/4] mptcp: cleanup and support more ephemeral ports sockopts From: patchwork-bot+netdevbpf@kernel.org Message-Id: <170363042382.9770.13227130852306828650.git-patchwork-notify@kernel.org> Date: Tue, 26 Dec 2023 22:40:23 +0000 References: <20231219-upstream-net-next-20231219-mptcp-sockopts-ephemeral-ports-v1-0-2b13bedfcaf8@kernel.org> In-Reply-To: <20231219-upstream-net-next-20231219-mptcp-sockopts-ephemeral-ports-v1-0-2b13bedfcaf8@kernel.org> To: Matthieu Baerts Cc: mptcp@lists.linux.dev, martineau@kernel.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, shuah@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, dcaratti@redhat.com, max@internet.ru Hello: This series was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 19 Dec 2023 22:31:03 +0100 you wrote: > Patch 1 is a cleanup one: mptcp_is_tcpsk() helper was modifying sock_ops > in some cases which is unexpected with that name. > > Patch 2 to 4 add support for two socket options: IP_LOCAL_PORT_RANGE and > IP_BIND_ADDRESS_NO_PORT. The first one is a preparation patch, the > second one adds the support while the last one modifies an existing > selftest to validate the new features. > > [...] Here is the summary with links: - [net-next,1/4] mptcp: don't overwrite sock_ops in mptcp_is_tcpsk() https://git.kernel.org/netdev/net-next/c/8e2b8a9fa512 - [net-next,2/4] mptcp: rename mptcp_setsockopt_sol_ip_set_transparent() https://git.kernel.org/netdev/net-next/c/57d3117ca80f - [net-next,3/4] mptcp: sockopt: support IP_LOCAL_PORT_RANGE and IP_BIND_ADDRESS_NO_PORT https://git.kernel.org/netdev/net-next/c/c85636a29264 - [net-next,4/4] selftests/net: add MPTCP coverage for IP_LOCAL_PORT_RANGE https://git.kernel.org/netdev/net-next/c/122db5e3634b You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html