[{"id":3683806,"web_url":"http://patchwork.ozlabs.org/comment/3683806/","msgid":"<0426d12f-17a1-aff8-69c8-39daea37abda@ssi.bg>","list_archive_url":null,"date":"2026-04-29T05:16:27","subject":"Re: [PATCH nf 0/7] IPVS fixes for nf","submitter":{"id":2825,"url":"http://patchwork.ozlabs.org/api/people/2825/","name":"Julian Anastasov","email":"ja@ssi.bg"},"content":"Hello,\n\nOn Tue, 28 Apr 2026, Julian Anastasov wrote:\n\n>         This patchset contains accumulated fixes for the nf tree:\n> \n> 1-3) Fixes for the recently added resizable hash tables (v5)\n> \n> 4) fixed races and locking for the estimation kthreads (v5)\n> \n> 5) fix for wrong roundup_pow_of_two() usage in the resizable hash\n>    tables\n> \n> 6-7) v2 of the changes from Waiman Long to properly guard against\n>   the housekeeping_cpumask() updates:\n> \n>   https://lore.kernel.org/netfilter-devel/20260331165015.2777765-1-longman@redhat.com/\n> \n>   I added Fixes tag to the 7th patch. The original description:\n> \n>   Since commit 041ee6f3727a (\"kthread: Rely on HK_TYPE_DOMAIN for preferred\n>   affinity management\"), the HK_TYPE_KTHREAD housekeeping cpumask may no\n>   longer be correct in showing the actual CPU affinity of kthreads that\n>   have no predefined CPU affinity. As the ipvs networking code is still\n>   using HK_TYPE_KTHREAD, we need to make HK_TYPE_KTHREAD reflect the\n>   reality.\n> \n>   This patch series makes HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n>   and uses RCU to protect access to the HK_TYPE_KTHREAD housekeeping\n>   cpumask.\n> \n> Julian Anastasov (5):\n>   ipvs: fixes for the new ip_vs_status info\n>   ipvs: fix races around the conn_lfactor and svc_lfactor sysctl vars\n>   ipvs: fix the spin_lock usage for RT build\n>   ipvs: fix races around est_mutex and est_cpulist\n>   ipvs: fix shift-out-of-bounds in ip_vs_rht_desired_size\n> \n> Waiman Long (2):\n>   sched/isolation: Make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n>   ipvs: Guard access of HK_TYPE_KTHREAD cpumask with RCU\n> \n>  include/linux/sched/isolation.h |   6 +-\n>  include/net/ip_vs.h             |  31 ++++++--\n>  net/netfilter/ipvs/ip_vs_conn.c |  76 ++++++++++---------\n>  net/netfilter/ipvs/ip_vs_core.c |   2 +-\n>  net/netfilter/ipvs/ip_vs_ctl.c  | 127 ++++++++++++++++++++++++--------\n>  net/netfilter/ipvs/ip_vs_est.c  |  83 ++++++++++++---------\n>  6 files changed, 217 insertions(+), 108 deletions(-)\n\n\tSashiko found some new issues to address, will\nsend v2 later today...\n\nhttps://sashiko.dev/#/patchset/20260428175725.72050-1-ja%40ssi.bg\n\npw-bot: changes-requested\n\nRegards\n\n--\nJulian Anastasov <ja@ssi.bg>","headers":{"Return-Path":"\n <netfilter-devel+bounces-12279-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (4096-bit key;\n unprotected) header.d=ssi.bg header.i=@ssi.bg header.a=rsa-sha256\n header.s=ssi header.b=7Fi/AMUz;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12279-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=\"7Fi/AMUz\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=193.238.174.39","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=ssi.bg"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g55C425HPz1yHv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 15:17:04 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 9F70630027EF\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 05:17:00 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 5DB222C236B;\n\tWed, 29 Apr 2026 05:16:57 +0000 (UTC)","from mx.ssi.bg (mx.ssi.bg [193.238.174.39])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id F13C0208D0;\n\tWed, 29 Apr 2026 05:16:51 +0000 (UTC)","from mx.ssi.bg (localhost [127.0.0.1])\n\tby mx.ssi.bg (Potsfix) with ESMTP id EE1C5211C1;\n\tWed, 29 Apr 2026 08:16:42 +0300 (EEST)","from box.ssi.bg (box.ssi.bg [193.238.174.46])\n\tby mx.ssi.bg (Potsfix) with ESMTPS;\n\tWed, 29 Apr 2026 08:16:41 +0300 (EEST)","from ja.ssi.bg (unknown [213.16.62.126])\n\tby box.ssi.bg (Potsfix) with ESMTPSA id 35C0F6298F;\n\tWed, 29 Apr 2026 08:16:39 +0300 (EEST)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby ja.ssi.bg (8.18.1/8.18.1) with ESMTP id 63T5GRgn009355;\n\tWed, 29 Apr 2026 08:16:31 +0300"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777439816; cv=none;\n b=Ef0XckXRm8LTQwSB9VJxu41FoJuz1lFLZQ2ZoorPJERBdQqe80r9mbWUhmC6Gre4XAmggMbvdpbrjxhlRdVYhq4Vh3qYdWBNvQNi9TaZAdG3zwl8MHXzeKHzz/hEg2doQZFnE4sjyLPf9l7BZSgiRRwcZgXoJmzpd+YlBTzP4yk=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777439816; c=relaxed/simple;\n\tbh=d6SItQBhjhxfHzbQ3yzPPdKM7+1IIQe3nMP3RIuH2MA=;\n\th=Date:From:To:cc:Subject:In-Reply-To:Message-ID:References:\n\t MIME-Version:Content-Type;\n b=SxlxWbHvLXykKcT6tEMgUqQ+8AfHiKHpK3nSvSCxYfdGPvkfatLDGZ67GzyaxhPz5Dm4RaHciKnvcvFMn7809lWy/aycW6KmNhvuYBV5xHbTmePjTVfiJ5nJNNlS45C8CfUnOhmYXwL+ubl8BXM4YT4gXq+dHFnIZbo1i5upx50=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg;\n spf=pass smtp.mailfrom=ssi.bg;\n dkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=7Fi/AMUz;\n arc=none smtp.client-ip=193.238.174.39","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ssi.bg; h=cc:cc\n\t:content-type:content-type:date:from:from:in-reply-to:message-id\n\t:mime-version:references:reply-to:subject:subject:to:to; s=ssi;\n\t bh=tv5gaK/rTp/1Rb5TMCDfyYjWr7gaWs6l6ycHei8mXEQ=; b=7Fi/AMUzrDEx\n\t/HWCxYN2mKK2trtR2mMFsDymKWcozv4VgU5TTnwhpvs4N1yzRrukrUirAWIai2xK\n\tMmNZ4XdJm/ZPUkckRHrZwv+YEzSMY185lWDAUtwj+fE580XmLFLX6mz0wP5fdhqv\n\tVnrz8n97un1mJGp+PWYa5lwCt7SX5lc7oQEJYxY8XmeQCRJAo982FX/e9+DY1dnk\n\tuSJgCqL2KoOw2urh4xoUVURxp2IWJeqoODcH/8MFjyM3CrpoV8oj6GKpmvpI/oBr\n\tXKE38IW3/pIeOxCRVCmBNJT5VQcnGaWAX8X3e5+D+TLxUu841akBHApFrWKXiXGy\n\tImx6GS/vVWsEuS8LtEnCRC2O+Ya3AVEwElLmo8QMGNhQwjyUI0hlGk+ZUunz3wd1\n\t0lzSC7LUDQcBVIZ9mS/r2QruFDOz+MZONbdlPNiH/k3mNqNWo0mf6EN5V4xQxlT3\n\tGsWbmAMBrW6apuYrXlDCHdtPDQdAmSe3inx0uo76BI96mPHcrv3aQjDWih1lI2Qp\n\ttLBjyPCj9x9VBabWyj3fxWEjyaxZYa2EExPgECxRWSVJCytSEc/0R8NJozAKKqs+\n\toXF9TJa85xJ3Qoz0cm0GD35wJOAqxAEIC5biDCiwhJgO6/DY4hCXVj+4LUOUOa5Z\n\tme9AKCZt85guaUynmEvp66F+ASk6IMA=","Date":"Wed, 29 Apr 2026 08:16:27 +0300 (EEST)","From":"Julian Anastasov <ja@ssi.bg>","To":"Simon Horman <horms@verge.net.au>","cc":"Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n        Waiman Long <longman@redhat.com>, lvs-devel@vger.kernel.org,\n        netfilter-devel@vger.kernel.org","Subject":"Re: [PATCH nf 0/7] IPVS fixes for nf","In-Reply-To":"<20260428175725.72050-1-ja@ssi.bg>","Message-ID":"<0426d12f-17a1-aff8-69c8-39daea37abda@ssi.bg>","References":"<20260428175725.72050-1-ja@ssi.bg>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=US-ASCII"}}]