Cover Letter Detail
Show a cover letter.
GET /api/1.1/covers/2230248/?format=api
{ "id": 2230248, "url": "http://patchwork.ozlabs.org/api/1.1/covers/2230248/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260429141055.85052-1-ja@ssi.bg/", "project": { "id": 26, "url": "http://patchwork.ozlabs.org/api/1.1/projects/26/?format=api", "name": "Netfilter Development", "link_name": "netfilter-devel", "list_id": "netfilter-devel.vger.kernel.org", "list_email": "netfilter-devel@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<20260429141055.85052-1-ja@ssi.bg>", "date": "2026-04-29T14:10:47", "name": "[PATCHv2,nf,0/8] IPVS fixes for nf", "submitter": { "id": 2825, "url": "http://patchwork.ozlabs.org/api/1.1/people/2825/?format=api", "name": "Julian Anastasov", "email": "ja@ssi.bg" }, "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260429141055.85052-1-ja@ssi.bg/mbox/", "series": [ { "id": 502075, "url": "http://patchwork.ozlabs.org/api/1.1/series/502075/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=502075", "date": "2026-04-29T14:10:47", "name": "IPVS fixes for nf", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/502075/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2230248/comments/", "headers": { "Return-Path": "\n <netfilter-devel+bounces-12287-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "netfilter-devel@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (4096-bit key;\n unprotected) header.d=ssi.bg header.i=@ssi.bg header.a=rsa-sha256\n header.s=ssi header.b=JW0YG1N1;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12287-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=\"JW0YG1N1\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=193.238.174.39", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=ssi.bg" ], "Received": [ "from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5K7G5l8Dz1yHX\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 30 Apr 2026 00:14:34 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 2CF72301B16F\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 14:11:35 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 89E0F3CA499;\n\tWed, 29 Apr 2026 14:11:34 +0000 (UTC)", "from mx.ssi.bg (mx.ssi.bg [193.238.174.39])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 398282D8370;\n\tWed, 29 Apr 2026 14:11:28 +0000 (UTC)", "from mx.ssi.bg (localhost [127.0.0.1])\n\tby mx.ssi.bg (Potsfix) with ESMTP id 8D36A21C31;\n\tWed, 29 Apr 2026 17:11:26 +0300 (EEST)", "from box.ssi.bg (box.ssi.bg [193.238.174.46])\n\tby mx.ssi.bg (Potsfix) with ESMTPS;\n\tWed, 29 Apr 2026 17:11:25 +0300 (EEST)", "from ja.ssi.bg (unknown [213.16.62.126])\n\tby box.ssi.bg (Potsfix) with ESMTPSA id D162B6088F;\n\tWed, 29 Apr 2026 17:11:22 +0300 (EEST)", "from ja.home.ssi.bg (localhost.localdomain [127.0.0.1])\n\tby ja.ssi.bg (8.18.1/8.18.1) with ESMTP id 63TEBL7v085080;\n\tWed, 29 Apr 2026 17:11:21 +0300", "(from root@localhost)\n\tby ja.home.ssi.bg (8.18.1/8.18.1/Submit) id 63TEBI2j085076;\n\tWed, 29 Apr 2026 17:11:18 +0300" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777471892; cv=none;\n b=oJOpUUTBwmbUOv0uXcDsyz1p3flLg7h3GXnj6N9+kAUXPkkjI7VmZDJioAASwBqaS5quLpKGw4j/QNW0ggdk/fKinQOCJC6PGczfk43px8neoFKp8gj8pvx//f6VKUFIKahh5Qz9Y6kkvJVPkrRvBtpR3ljfHDu5WznHt9WaMpQ=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777471892; c=relaxed/simple;\n\tbh=MRIWJT3Arup1XB/LpeZr3s0ADCn57ZIBAFVEgSEDovo=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=MUlPqSurmhQcP8WE9AGzwzhfehNJUZE4zfiqeYNadRg4WSiDw6SDjqPbSQdZsuvOAoDZzkYUhR6Lc45ijjNxh0TnmGiL4hMCdGDrrLisR1xH8UiCZgZjJH++UNlRmnZaX6zy+WyN0UT6RM3ofCCq9FjrtM+rrOS9X+NhaFt1LCY=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg;\n spf=pass smtp.mailfrom=ssi.bg;\n dkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=JW0YG1N1;\n arc=none smtp.client-ip=193.238.174.39", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ssi.bg; h=cc:cc\n\t:content-transfer-encoding:date:from:from:message-id\n\t:mime-version:reply-to:subject:subject:to:to; s=ssi; bh=elJNi65f\n\tqX1AUS4d4CN/PY6KMNv4fGwG8egrE2GAzNg=; b=JW0YG1N1idXmJgyo16Xlg1iF\n\tKjrRfZ6N2AYABeHZE8VHCdZYwaBiZ5fNCN/aTL2xUxzbzlqqYPbmQ28p3UTXC/Ez\n\tbvZJSVorFs+dpN5VmTtGoG49S1WQF2np1MBtpRGGj/zIR68hijjqgpIdoJgvz8PH\n\tytO0zAoaSC9bEI+WjquHLPOr2pBEKy0aLryQCXVC4gsTRTdMxPBQmXyfKUcLXAQ+\n\tQsinD9BEpQiu/VD1QpPsq9xx5AWqUh+mwYKctwAwpTq/SpAodOm29Rz548AldKMx\n\tgKq1rr7NOi22XL7uj9h4nhSe2JdHL3ZAuHhjAeimtgwwK4xlhAqH5VtYeRyscXyS\n\tChHmR1TOL/f+Fisc4vteVKPdiS9CMl0Wa11Q3LcMwS0F4+eXns2S/sByUwXMa7Fh\n\t1TAV6OgpJo53dwC4LX36z0vI5VXup7mDmkHr4JK5gJAkCreaPT4tzGxFhk7HjxxS\n\tBiIaUfCNwveSsmwHlbSUEI1NslFgEAYuc5h0mqC3D7Ae6CRQUv+5zqWHl4goornW\n\tOTDABat7qhKeA6mg4oWWh/KAP9NPuMg/EtQl+rI6UGxjmPiL/0YPT0Sk4r+3b8l4\n\tFhr9AABsgXCZJXRcvraqxGTxxXg0b3soLtUybXuwWFKmQbdoDcPeXLkLirUBrVvh\n\trHOER2wG7MNbyodwusw=", "From": "Julian Anastasov <ja@ssi.bg>", "To": "Simon Horman <horms@verge.net.au>", "Cc": "Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n Waiman Long <longman@redhat.com>, lvs-devel@vger.kernel.org,\n netfilter-devel@vger.kernel.org", "Subject": "[PATCHv2 nf 0/8] IPVS fixes for nf", "Date": "Wed, 29 Apr 2026 17:10:47 +0300", "Message-ID": "<20260429141055.85052-1-ja@ssi.bg>", "X-Mailer": "git-send-email 2.53.0", "Precedence": "bulk", "X-Mailing-List": "netfilter-devel@vger.kernel.org", "List-Id": "<netfilter-devel.vger.kernel.org>", "List-Subscribe": "<mailto:netfilter-devel+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:netfilter-devel+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit" }, "content": "Hello,\n\n This patchset contains accumulated fixes for the nf tree:\n\n1-3) Fixes for the recently added resizable hash tables (v5)\n\n4) dest from trash can be leaked if ip_vs_start_estimator() fails\n\n5) fixed races and locking for the estimation kthreads (v5)\n\n6) fix for wrong roundup_pow_of_two() usage in the resizable hash\n tables\n\n7-8) v2 of the changes from Waiman Long to properly guard against\n the housekeeping_cpumask() updates:\n\n https://lore.kernel.org/netfilter-devel/20260331165015.2777765-1-longman@redhat.com/\n\n I added missing Fixes tag. The original description:\n\n Since commit 041ee6f3727a (\"kthread: Rely on HK_TYPE_DOMAIN for preferred\n affinity management\"), the HK_TYPE_KTHREAD housekeeping cpumask may no\n longer be correct in showing the actual CPU affinity of kthreads that\n have no predefined CPU affinity. As the ipvs networking code is still\n using HK_TYPE_KTHREAD, we need to make HK_TYPE_KTHREAD reflect the\n reality.\n\n This patch series makes HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n and uses RCU to protect access to the HK_TYPE_KTHREAD housekeeping\n cpumask.\n\nv2:\n* Reports: https://sashiko.dev/#/patchset/20260428175725.72050-1-ja%40ssi.bg\n* introduce new patch at position 4 (dest leak)\n* patch 6: check for n > 1 before roundup_pow_of_two\n* patch 7 and 8 are now in reverse order to help bisection\n\nJulian Anastasov (6):\n ipvs: fixes for the new ip_vs_status info\n ipvs: fix races around the conn_lfactor and svc_lfactor sysctl vars\n ipvs: fix the spin_lock usage for RT build\n ipvs: do not leak dest after get from dest trash\n ipvs: fix races around est_mutex and est_cpulist\n ipvs: fix shift-out-of-bounds in ip_vs_rht_desired_size\n\nWaiman Long (2):\n ipvs: Guard access of HK_TYPE_KTHREAD cpumask with RCU\n sched/isolation: Make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n\n include/linux/sched/isolation.h | 6 +-\n include/net/ip_vs.h | 31 +++++-\n net/netfilter/ipvs/ip_vs_conn.c | 76 ++++++++-------\n net/netfilter/ipvs/ip_vs_core.c | 2 +-\n net/netfilter/ipvs/ip_vs_ctl.c | 164 +++++++++++++++++++++++---------\n net/netfilter/ipvs/ip_vs_est.c | 83 +++++++++-------\n 6 files changed, 241 insertions(+), 121 deletions(-)" }