[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 5.15.0-1057.63

---
linux-aws (5.15.0-1057.63) jammy; urgency=medium

  * Packaging resync (LP: #1786013)
- debian.aws/dkms-versions -- update from kernel-versions (main/2024.03.04)

 -- Philip Cox   Tue, 19 Mar 2024 12:10:59
-0400

** Changed in: linux-aws (Ubuntu Jammy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  Invalid
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-aws source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Invalid
Status in linux-aws source package in Jammy:
  Fix Released
Status in linux source package in Mantic:
  Invalid
Status in linux-aws source package in Mantic:
  Fix Released

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 6.5.0-1017.17

---
linux-aws (6.5.0-1017.17) mantic; urgency=medium

  * mantic/linux-aws: 6.5.0-1017.17 -proposed tracker (LP: #2055564)

  * Packaging resync (LP: #1786013)
- [Packaging] drop ABI data
- debian.aws/dkms-versions -- update from kernel-versions (main/2024.03.04)

  * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from
linux-modules-extra to linux-modules (LP: #2045561)
- [Packaging] Move dmi-sysfs.ko into linux-modules

  * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-
modules-extra to linux-modules (LP: #2054809)
- UBUNTU [Packaging]: Include erofs in linux-modules instead of 
linux-modules-
  extra

  * aws: Backport latest ENA driver in upstream Linux to enable IRQ moderation
(LP: #2056475)
- net: ena: Enable DIM by default

  * tcp: Add memory barrier to tcp_push() (LP: #2051727)
- tcp: Add memory barrier to tcp_push()

  [ Ubuntu: 6.5.0-27.28 ]

  * mantic/linux: 6.5.0-27.28 -proposed tracker (LP: #2055584)
  * Packaging resync (LP: #1786013)
- [Packaging] drop ABI data
- [Packaging] update annotations scripts
- debian.master/dkms-versions -- update from kernel-versions 
(main/2024.03.04)
  * CVE-2024-26597
- net: qualcomm: rmnet: fix global oob in rmnet_policy
  * CVE-2024-26599
- pwm: Fix out-of-bounds access in of_pwm_single_xlate()
  * Drop ABI checks from kernel build (LP: #2055686)
- [Packaging] Remove in-tree abi checks
  * Cranky update-dkms-versions rollout (LP: #2055685)
- [Packaging] remove update-dkms-versions
- Move debian/dkms-versions to debian.master/dkms-versions
- [Packaging] Replace debian/dkms-versions with $(DEBIAN)/dkms-versions
  * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-
modules-extra to linux-modules (LP: #2054809)
- UBUNTU [Packaging]: Include erofs in linux-modules instead of 
linux-modules-
  extra
  * performance: Scheduler: ratelimit updating of load_avg (LP: #2053251)
- sched/fair: Ratelimit update to tg->load_avg
  * IB peer memory feature regressed in 6.5 (LP: #2055082)
- SAUCE: RDMA/core: Introduce peer memory interface
  * linux-tools-common: man page of usbip[d] is misplaced (LP: #2054094)
- [Packaging] rules: Put usbip manpages in the correct directory
  * CVE-2024-23851
- dm: limit the number of targets and parameter size area
  * CVE-2024-23850
- btrfs: do not ASSERT() if the newly created subvolume already got read
  * x86: performance: tsc: Extend watchdog check exemption to 4-Sockets platform
(LP: #2054699)
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform
  * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from
linux-modules-extra to linux-modules (LP: #2045561)
- [Packaging] Move dmi-sysfs.ko into linux-modules
  * Fix AMD brightness issue on AUO panel (LP: #2054773)
- drm/amdgpu: make damage clips support configurable
  * Mantic update: upstream stable patchset 2024-02-28 (LP: #2055199)
- f2fs: explicitly null-terminate the xattr list
- pinctrl: lochnagar: Don't build on MIPS
- ALSA: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro
- mptcp: fix uninit-value in mptcp_incoming_options
- wifi: cfg80211: lock wiphy mutex for rfkill poll
- wifi: avoid offset calculation on NULL pointer
- wifi: mac80211: handle 320 MHz in ieee80211_ht_cap_ie_to_sta_ht_cap
- debugfs: fix automount d_fsdata usage
- nvme-core: fix a memory leak in nvme_ns_info_from_identify()
- drm/amd/display: update dcn315 lpddr pstate latency
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer
- smb: client, common: fix fortify warnings
- blk-mq: don't count completed flush data request as inflight in case of
  quiesce
- nvme-core: check for too small lba shift
- hwtracing: hisi_ptt: Handle the interrupt in hardirq context
- hwtracing: hisi_ptt: Don't try to attach a task
- ASoC: wm8974: Correct boost mixer inputs
- arm64: dts: rockchip: fix rk356x pcie msg interrupt name
- ASoC: Intel: Skylake: Fix mem leak in few functions
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted
  __be16
- ASoC: Intel: Skylake: mem leak in skl register function
- ASoC: cs43130: Fix the position of const qualifier
- ASoC: cs43130: Fix incorrect frame delay configuration
- ASoC: rt5650: add mutex to avoid the jack detection failure
- ASoC: Intel: skl_hda_dsp_generic: Drop HDMI routes when HDMI is not
  available
- nouveau/tu102: flush all pdbs on vmm flush
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13
- ASoC: hdac_hda: Conditionally register dais for HDMI and Analog
- net/tg3: fix race condition in tg3_reset_task()
- ASoC: da7219: Support low DC impedance headset
- nvme: introduce helper 

[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 5.4.0-1122.132

---
linux-aws (5.4.0-1122.132) focal; urgency=medium

  * focal/linux-aws: 5.4.0-1122.132 -proposed tracker (LP: #2055639)

  * Focal update: v5.4.267 upstream stable release (LP: #2054406)
- [Config] Update annotations for CONFIG_SND_MESON_CODEC_GLUE

  * Packaging resync (LP: #1786013)
- [Packaging] drop ABI data
- debian.aws/dkms-versions -- update from kernel-versions (main/2024.03.04)

  * aws: Backport latest ENA driver in upstream Linux to enable IRQ moderation
(LP: #2056475)
- net: ena: Enable DIM by default

  * tcp: Add memory barrier to tcp_push() (LP: #2051727)
- tcp: Add memory barrier to tcp_push()

  [ Ubuntu: 5.4.0-175.195 ]

  * focal/linux: 5.4.0-175.195 -proposed tracker (LP: #2055684)
  * Packaging resync (LP: #1786013)
- [Packaging] drop ABI data
- [Packaging] update annotations scripts
- debian.master/dkms-versions -- update from kernel-versions 
(main/2024.03.04)
  * Drop ABI checks from kernel build (LP: #2055686)
- [Packaging] Remove in-tree abi checks
- [Packaging] Bring back install- prerequisite for checks-
- [Packaging] Remove abi-check from final-checks
  * Cranky update-dkms-versions rollout (LP: #2055685)
- [Packaging] remove update-dkms-versions
- Move debian/dkms-versions to debian.master/dkms-versions
- [Packaging] Replace debian/dkms-versions with $(DEBIAN)/dkms-versions
- [Packaging] remove update-version-dkms
  * linux-tools-common: man page of usbip[d] is misplaced (LP: #2054094)
- [Packaging] rules: Put usbip manpages in the correct directory
  * CVE-2024-23851
- dm ioctl: log an error if the ioctl structure is corrupted
- dm: limit the number of targets and parameter size area
  * Focal update: v5.4.268 upstream stable release (LP: #2055075)
- f2fs: explicitly null-terminate the xattr list
- pinctrl: lochnagar: Don't build on MIPS
- ALSA: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro
- ASoC: Intel: Skylake: Fix mem leak in few functions
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted
  __be16
- ASoC: Intel: Skylake: mem leak in skl register function
- ASoC: cs43130: Fix the position of const qualifier
- ASoC: cs43130: Fix incorrect frame delay configuration
- ASoC: rt5650: add mutex to avoid the jack detection failure
- nouveau/tu102: flush all pdbs on vmm flush
- net/tg3: fix race condition in tg3_reset_task()
- ASoC: da7219: Support low DC impedance headset
- nvme: introduce helper function to get ctrl state
- drm/exynos: fix a potential error pointer dereference
- drm/exynos: fix a wrong error checking
- clk: rockchip: rk3128: Fix HCLK_OTG gate register
- jbd2: correct the printing of write_flags in jbd2_write_superblock()
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc
- neighbour: Don't let neigh_forced_gc() disable preemption for long
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing
- tracing: Add size check when printing trace_marker output
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in
  NMI
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode
- Input: i8042 - add nomux quirk for Acer P459-G2-M
- s390/scm: fix virtual vs physical address confusion
- ARC: fix spare error
- Input: xpad - add Razer Wolverine V2 support
- ARM: sun9i: smp: fix return code check of of_property_match_string
- drm/crtc: fix uninitialized variable use
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx
- binder: use EPOLLERR from eventpoll.h
- binder: fix trivial typo of binder_free_buf_locked()
- binder: fix comment on binder_alloc_new_buf() return value
- uio: Fix use-after-free in uio_open
- parport: parport_serial: Add Brainboxes BAR details
- parport: parport_serial: Add Brainboxes device IDs and geometry
- coresight: etm4x: Fix width of CCITMIN field
- x86/lib: Fix overflow when counting digits
- EDAC/thunderx: Fix possible out-of-bounds string access
- powerpc: add crtsavres.o to always-y instead of extra-y
- powerpc/44x: select I2C for CURRITUCK
- powerpc/pseries/memhotplug: Quieten some DLPAR operations
- powerpc/pseries/memhp: Fix access beyond end of drmem array
- selftests/powerpc: Fix error handling in FPU/VMX preemption tests
- powerpc/powernv: Add a null pointer check to scom_debug_init_one()
- powerpc/powernv: Add a null pointer check in opal_event_init()
- powerpc/powernv: Add a null pointer check in opal_powercap_init()
- powerpc/imc-pmu: Add a null pointer check in update_events_in_group()
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response
- ACPI: video: check for error while searching for 

[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-03 Thread Roxana Nicolescu
** Tags removed: verification-passed-focal-linux-aws 
verification-passed-focal-linux-aws-5.15 
verification-passed-jammy-linux-aws-fips verification-passed-mantic-linux-aws
** Tags added: verification-done-focal-linux-aws 
verification-done-focal-linux-aws-5.15 verification-done-jammy-linux-aws-fips 
verification-done-mantic-linux-aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  Invalid
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-aws source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Invalid
Status in linux-aws source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Invalid
Status in linux-aws source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-03 Thread Roxana Nicolescu
This was added to linux-aws, not linux and it messed up the verification
process

** Also affects: linux-aws (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Focal)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Jammy)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Mantic)
   Status: Fix Committed => Invalid

** Changed in: linux-aws (Ubuntu)
   Status: New => Invalid

** Changed in: linux-aws (Ubuntu Focal)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux-aws (Ubuntu Jammy)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux-aws (Ubuntu Mantic)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux-aws (Ubuntu Focal)
   Status: New => Fix Committed

** Changed in: linux-aws (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux-aws (Ubuntu Mantic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  Invalid
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-aws source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Invalid
Status in linux-aws source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Invalid
Status in linux-aws source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-04-02 Thread Philip Cox
** Tags removed: verification-needed-focal-linux-aws 
verification-needed-focal-linux-aws-5.15 
verification-needed-jammy-linux-aws-fips verification-needed-mantic-linux-aws
** Tags added: verification-passed-focal-linux-aws 
verification-passed-focal-linux-aws-5.15 
verification-passed-jammy-linux-aws-fips verification-passed-mantic-linux-aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-03-29 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
aws-5.15/5.15.0-1057.63~20.04.1 kernel in -proposed solves the problem.
Please test the kernel and update this bug with the results. If the
problem is solved, change the tag 'verification-needed-focal-linux-
aws-5.15' to 'verification-done-focal-linux-aws-5.15'. If the problem
still exists, change the tag 'verification-needed-focal-linux-aws-5.15'
to 'verification-failed-focal-linux-aws-5.15'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-focal-linux-aws-5.15-v2 
verification-needed-focal-linux-aws-5.15

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-03-29 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-aws-
fips/5.15.0-1057.63+fips1 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-aws-fips' to
'verification-done-jammy-linux-aws-fips'. If the problem still exists,
change the tag 'verification-needed-jammy-linux-aws-fips' to
'verification-failed-jammy-linux-aws-fips'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-aws-fips-v2 
verification-needed-jammy-linux-aws-fips

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-03-25 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-aws/6.5.0-1017.17
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-mantic-linux-aws' to 'verification-done-mantic-
linux-aws'. If the problem still exists, change the tag 'verification-
needed-mantic-linux-aws' to 'verification-failed-mantic-linux-aws'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-mantic-linux-aws-v2 
verification-needed-mantic-linux-aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-03-21 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-aws/5.4.0-1122.132
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-focal-linux-aws' to 'verification-done-focal-
linux-aws'. If the problem still exists, change the tag 'verification-
needed-focal-linux-aws' to 'verification-failed-focal-linux-aws'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-focal-linux-aws-v2 
verification-needed-focal-linux-aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-03-04 Thread Philip Cox
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Mantic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Mantic:
  Fix Committed

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2051727] Re: tcp: Add memory barrier to tcp_push()

2024-02-22 Thread Philip Cox
** Also affects: linux (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux (Ubuntu Mantic)
 Assignee: (unassigned) => Philip Cox (philcox)

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Mantic)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2051727

Title:
  tcp: Add memory barrier to tcp_push()

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  In Progress
Status in linux source package in Jammy:
  In Progress
Status in linux source package in Mantic:
  In Progress

Bug description:
  Recently a patch has been accepted on the Linux Kernel regarding the
  TCP stack which fix an additional +40ms latency on ARM64 CPU
  architecture without impacting other CPU types.

  More information can be find in here:
  https://lore.kernel.org/netdev/20240119190133.43698-1-dipi...@amazon.com/

  Would be possible to include the following patch as part of Linux
  image on the most recent and LTS maintained Ubuntu versions?

  
  Patch:
  ```
  ---
   net/ipv4/tcp.c | 1 +
   1 file changed, 1 insertion(+)

  diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
  index ff6838ca2e58..7bce79beca2b 100644
  --- a/net/ipv4/tcp.c
  +++ b/net/ipv4/tcp.c
  @@ -722,6 +722,7 @@ void tcp_push(struct sock *sk, int flags, int mss_now,
if (!test_bit(TSQ_THROTTLED, >sk_tsq_flags)) {
NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
set_bit(TSQ_THROTTLED, >sk_tsq_flags);
  + smp_mb__after_atomic();
}
/* It is possible TX completion already happened
 * before we set TSQ_THROTTLED.
  -- 
  ```

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051727/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp