{"id":2218220,"url":"http://patchwork.ozlabs.org/api/1.2/covers/2218220/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260331165015.2777765-1-longman@redhat.com/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.2/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260331165015.2777765-1-longman@redhat.com>","list_archive_url":null,"date":"2026-03-31T16:50:13","name":"[PATCH-next,v2,0/2] ipvs: Fix incorrect use of HK_TYPE_KTHREAD housekeeping cpumask","submitter":{"id":71281,"url":"http://patchwork.ozlabs.org/api/1.2/people/71281/?format=json","name":"Waiman Long","email":"longman@redhat.com"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260331165015.2777765-1-longman@redhat.com/mbox/","series":[{"id":498230,"url":"http://patchwork.ozlabs.org/api/1.2/series/498230/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=498230","date":"2026-03-31T16:50:14","name":"ipvs: Fix incorrect use of HK_TYPE_KTHREAD housekeeping cpumask","version":2,"mbox":"http://patchwork.ozlabs.org/series/498230/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2218220/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-11521-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=IzBwlvLt;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-11521-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.b=\"IzBwlvLt\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=170.10.129.124","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=redhat.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4flZmy2lTVz1yCp\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 01 Apr 2026 04:27:14 +1100 (AEDT)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id ED86A326A34D\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 31 Mar 2026 16:51:32 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id D9FA3425CD6;\n\tTue, 31 Mar 2026 16:50:52 +0000 (UTC)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 3F504423A8A\n\tfor <netfilter-devel@vger.kernel.org>; Tue, 31 Mar 2026 16:50:51 +0000 (UTC)","from mx-prod-mc-08.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-35-165-154-97.us-west-2.compute.amazonaws.com [35.165.154.97]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-399-Kn7xVzZcMV6J3_O8pKezog-1; Tue,\n 31 Mar 2026 12:50:42 -0400","from mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.93])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby mx-prod-mc-08.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id 22AE018002C8;\n\tTue, 31 Mar 2026 16:50:36 +0000 (UTC)","from llong-thinkpadp16vgen1.westford.csb (unknown [10.22.80.26])\n\tby mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP\n id 99205180036E;\n\tTue, 31 Mar 2026 16:50:31 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1774975852; cv=none;\n b=nUePn1NiPcsC62D940NLmnOzeB7EUbr5MxFBGTIYD/gfjF5q+du41XEBTq/mTLf+HGeiMzlNUcczN5VFVa0vzzYS4cCtJ6LLv+UG3aa3CiBmAsdekrLVYkCSIsHdwn2VHRhAXBA0yEO3SyJWXtil99WluSBjMDvlh4PK7O17VVo=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1774975852; c=relaxed/simple;\n\tbh=uaJTNDpTTNCJjLb0T0uqnNwZs8FWXt7CgFTzh7mNsPQ=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=AL4jMg9eIFvtQZg2tcLWg1eOeX5lgqdMyPyrnEmAKi60OdEiZUpeIW5Nd9C4piGuiMZlQRc5/hWPGw93FijoRP7P6TP7dp+qcsguyIp8fC260k6neZN2G57vF7OQeasqqBSxYrAOGXdTpcdJ+oOcx05ROk7BIvy0Dg8mRFAZOFI=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n spf=pass smtp.mailfrom=redhat.com;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.b=IzBwlvLt; arc=none smtp.client-ip=170.10.129.124","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1774975850;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=MbsngGMGgFXF4FxRKphAmfS3uQOFO0oUmRUWkib1ynE=;\n\tb=IzBwlvLtYS78rtjV4Xi4DGrlumdigQXySiB+5KN+PNzH2NU/Oa9CC5Dp0fywEP3RAY2/ST\n\t50rre3epeWiQ1B9KIze0/3JMGk6z/up08KY3bXQVBoafJ1sdCVcbTRSgHGaPE3EvzubeAr\n\t5/oMrwYTjfYRSDe4KYbCYD15b4WRDeo=","X-MC-Unique":"Kn7xVzZcMV6J3_O8pKezog-1","X-Mimecast-MFC-AGG-ID":"Kn7xVzZcMV6J3_O8pKezog_1774975837","From":"Waiman Long <longman@redhat.com>","To":"Simon Horman <horms@verge.net.au>,\n\tJulian Anastasov <ja@ssi.bg>,\n\t\"David S. Miller\" <davem@davemloft.net>,\n\tDavid Ahern <dsahern@kernel.org>,\n\tEric Dumazet <edumazet@google.com>,\n\tJakub Kicinski <kuba@kernel.org>,\n\tPaolo Abeni <pabeni@redhat.com>,\n\tPablo Neira Ayuso <pablo@netfilter.org>,\n\tFlorian Westphal <fw@strlen.de>,\n\tPhil Sutter <phil@nwl.cc>,\n\tFrederic Weisbecker <frederic@kernel.org>,\n\tChen Ridong <chenridong@huawei.com>,\n\tPhil Auld <pauld@redhat.com>","Cc":"linux-kernel@vger.kernel.org,\n\tnetdev@vger.kernel.org,\n\tlvs-devel@vger.kernel.org,\n\tnetfilter-devel@vger.kernel.org,\n\tcoreteam@netfilter.org,\n\tsheviks <sheviks@gmail.com>,\n\tWaiman Long <longman@redhat.com>","Subject":"[PATCH-next v2 0/2] ipvs: Fix incorrect use of HK_TYPE_KTHREAD\n housekeeping cpumask","Date":"Tue, 31 Mar 2026 12:50:13 -0400","Message-ID":"<20260331165015.2777765-1-longman@redhat.com>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-Scanned-By":"MIMEDefang 3.4.1 on 10.30.177.93"},"content":"v2:\n  - Rebased on top of linux-next\n\nSince commit 041ee6f3727a (\"kthread: Rely on HK_TYPE_DOMAIN for preferred\naffinity management\"), the HK_TYPE_KTHREAD housekeeping cpumask may no\nlonger be correct in showing the actual CPU affinity of kthreads that\nhave no predefined CPU affinity. As the ipvs networking code is still\nusing HK_TYPE_KTHREAD, we need to make HK_TYPE_KTHREAD reflect the\nreality.\n\nThis patch series makes HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\nand uses RCU to protect access to the HK_TYPE_KTHREAD housekeeping\ncpumask.\n\nWaiman Long (2):\n  sched/isolation: Make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n  ipvs: Guard access of HK_TYPE_KTHREAD cpumask with RCU\n\n include/linux/sched/isolation.h |  6 +++++-\n include/net/ip_vs.h             | 20 ++++++++++++++++----\n net/netfilter/ipvs/ip_vs_ctl.c  | 13 ++++++++-----\n 3 files changed, 29 insertions(+), 10 deletions(-)"}