ACK/Cmnt: [f/j/m:linux-aws][PATCH 0/1] tcp: Add memory barrier to tcp_push

Tim Gardner tim.gardner at canonical.com
Fri Feb 23 15:24:58 UTC 2024


On 2/22/24 11:29, Philip Cox wrote:
> 
> BugLink: https://bugs.launchpad.net/bugs/2051727
> 
> SRU Justification:
> 
> [Impact]
> 
> Recently a patch has been accepted on the Linux Kernel
> regarding the TCP stack which fix an additional +40ms
> latency on ARM64 CPU architecture without impacting
> other CPU types.
> 
> [Fix]
> 
> Upstream patch:
>     7267e8dcad6b2f9fce05a6a06335d7040acbc2b6: tcp: Add memory barrier to tcp_push()
> was submitted to address this.
> 
> [Test Plan]
> 
> AWS tested
> 
> [Where problems could occur]
> 
> The risk of regressions from this change is fairly low.
> 
> --
> 
> 
> Salvatore Dipietro (1):
>    tcp: Add memory barrier to tcp_push()
> 
>   net/ipv4/tcp.c | 1 +
>   1 file changed, 1 insertion(+)
> 
Acked-by: Tim Gardner <tim.gardner at canonical.com>

I happen to know that this LP bug is associated with a Sales Force case. 
Its no secret that we use SF to deal with paying customers, so I always 
add the SF case number to '[Other Info]' so that the relationship 
between LP and SF is easily traceable.

The other more compulsive observation that applies to many patch 
submissions is the discussion under '[Where problems could occur]'. That 
section doesn't need to describe the likelihood  of regression. That is 
really the purview of the reviewers. It quite literally expects a 
discussion of adverse symptoms a user might encounter. In this case it 
should be a comment about the possibility of network stalls or other 
adverse throughput impacts.
-- 
-----------
Tim Gardner
Canonical, Inc




More information about the kernel-team mailing list