{"id":2215433,"url":"http://patchwork.ozlabs.org/api/covers/2215433/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260324151827.2006656-1-longman@redhat.com/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260324151827.2006656-1-longman@redhat.com>","list_archive_url":null,"date":"2026-03-24T15:18:25","name":"[0/2] ipvs: Fix incorrect use of HK_TYPE_KTHREAD housekeeping cpumask","submitter":{"id":71281,"url":"http://patchwork.ozlabs.org/api/people/71281/?format=json","name":"Waiman Long","email":"longman@redhat.com"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260324151827.2006656-1-longman@redhat.com/mbox/","series":[{"id":497305,"url":"http://patchwork.ozlabs.org/api/series/497305/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=497305","date":"2026-03-24T15:18:25","name":"ipvs: Fix incorrect use of HK_TYPE_KTHREAD housekeeping cpumask","version":1,"mbox":"http://patchwork.ozlabs.org/series/497305/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2215433/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-11382-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=DUzNkpBI;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-11382-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.b=\"DUzNkpBI\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=170.10.129.124","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=redhat.com"],"Received":["from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fgDQb2D7Dz1y1G\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 25 Mar 2026 02:26:15 +1100 (AEDT)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 869523065E72\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 24 Mar 2026 15:19:13 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 11DD640627B;\n\tTue, 24 Mar 2026 15:19:10 +0000 (UTC)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 3A9693D5246\n\tfor <netfilter-devel@vger.kernel.org>; Tue, 24 Mar 2026 15:19:05 +0000 (UTC)","from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-381-vuqiLqJEN7aqlqKNrZsWVw-1; Tue,\n 24 Mar 2026 11:19:01 -0400","from mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.93])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id B4E511955EAC;\n\tTue, 24 Mar 2026 15:18:57 +0000 (UTC)","from llong-thinkpadp16vgen1.westford.csb (unknown [10.22.65.192])\n\tby mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP\n id 2F104180075C;\n\tTue, 24 Mar 2026 15:18:51 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1774365548; cv=none;\n b=W5mOcjIbsV+TPgMpQy3rTz7v8JT21LeyuQ7ifuCEE+FkS7zWf000/lacCkzQKf6c+UXv9cHepldZ4HNBL6QhgfoM/zdZ6j/DWS49/7qr8GiysFauNgtCfjJw5skzjwOh3rSZpuWqxJChHuseYV3M/FR4vkbGfMRzvkUO9na5om4=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1774365548; c=relaxed/simple;\n\tbh=6HhVUYhmyMTvcAMswOM3dLmuCaP1Ju8W9ZRentoH7XA=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=s7mTj7n3bKfYBOP2cRzNEd89Nl2rHl4WuNhZBFa+f2k7obZlErF3AtQ86FLF0Wp4Pc2/BamL2/8bScuEeq92joX3pK059Mh4aYDvPyHj73pjrcds2PfMvfE70qXvHQDlEtfcSr4KieFVsiRDahNpt3pfaPhVFhkEGIMD7t4liS8=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n spf=pass smtp.mailfrom=redhat.com;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.b=DUzNkpBI; arc=none smtp.client-ip=170.10.129.124","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1774365544;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=CSqalb9riJujooqwq7rgCHpq/1IqNcmhKMRp2FBzELY=;\n\tb=DUzNkpBIauuMdzVH0+aYwNorIO/KgrWhap7Z7bBCe8/M7AGQ6fNAcYXHbU5ozC5TpchYaO\n\tLYrdFvAYGaAoc9g8xkJ11mRzN7CqoKzZbwWv1jel44cCrICxtPtfZbV/7E/em2AujqtyPC\n\tJ9yEIj3JBYoi4o7Z6V5nXqiGAm7UhPU=","X-MC-Unique":"vuqiLqJEN7aqlqKNrZsWVw-1","X-Mimecast-MFC-AGG-ID":"vuqiLqJEN7aqlqKNrZsWVw_1774365538","From":"Waiman Long <longman@redhat.com>","To":"Simon Horman <horms@verge.net.au>,\n\tJulian Anastasov <ja@ssi.bg>,\n\t\"David S. Miller\" <davem@davemloft.net>,\n\tDavid Ahern <dsahern@kernel.org>,\n\tEric Dumazet <edumazet@google.com>,\n\tJakub Kicinski <kuba@kernel.org>,\n\tPaolo Abeni <pabeni@redhat.com>,\n\tPablo Neira Ayuso <pablo@netfilter.org>,\n\tFlorian Westphal <fw@strlen.de>,\n\tPhil Sutter <phil@nwl.cc>,\n\tFrederic Weisbecker <frederic@kernel.org>,\n\tChen Ridong <chenridong@huawei.com>,\n\tPhil Auld <pauld@redhat.com>","Cc":"linux-kernel@vger.kernel.org,\n\tnetdev@vger.kernel.org,\n\tlvs-devel@vger.kernel.org,\n\tnetfilter-devel@vger.kernel.org,\n\tcoreteam@netfilter.org,\n\tsheviks <sheviks@gmail.com>,\n\tWaiman Long <longman@redhat.com>","Subject":"[PATCH 0/2] ipvs: Fix incorrect use of HK_TYPE_KTHREAD housekeeping\n cpumask","Date":"Tue, 24 Mar 2026 11:18:25 -0400","Message-ID":"<20260324151827.2006656-1-longman@redhat.com>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-Scanned-By":"MIMEDefang 3.4.1 on 10.30.177.93"},"content":"Since commit 041ee6f3727a (\"kthread: Rely on HK_TYPE_DOMAIN for preferred\naffinity management\"), the HK_TYPE_KTHREAD housekeeping cpumask may no\nlonger be correct in showing the actual CPU affinity of kthreads that\nhave no predefined CPU affinity. As the ipvs networking code is still\nusing HK_TYPE_KTHREAD, we need to make HK_TYPE_KTHREAD reflect the\nreality.\n\nThis patch series makes HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\nand uses RCU to protect access to the HK_TYPE_KTHREAD housekeeping\ncpumask.\n\nWaiman Long (2):\n  sched/isolation: Make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n  ipvs: Guard access of HK_TYPE_KTHREAD cpumask with RCU\n\n include/linux/sched/isolation.h |  6 +++++-\n include/net/ip_vs.h             | 20 ++++++++++++++++----\n net/netfilter/ipvs/ip_vs_ctl.c  | 13 ++++++++-----\n 3 files changed, 29 insertions(+), 10 deletions(-)"}