← Back to team overview

kernel-packages team mailing list archive

[Bug 1400349] [NEW] [SRU] new arm64 optimized copy_to_user and copy_from_user assembly code

 

Public bug reported:

[Impact]
The copy_{to,from}_user implementations in the Ubuntu kernel are suboptimal. Optimized implementations have been submitted upstream and have shown a significant improvement in network performance.

[Test Case]
Generate traffic from one node to another using iperf.

[Regression Risk]
These functions are obviously used heavily throughout the kernel, so a defect here could have significant impact. This risk is mitigated by using an implementation heavily based on the linaro string libraries (which are used in other places already, e.g. glibc), and through active testing of this patch on real hardware using a trusty-kernel base. The new patch will also undergo regression testing to ensure the memory corruption issue of the previous patch does not exist.

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1400349

Title:
  [SRU] new arm64 optimized copy_to_user and copy_from_user assembly
  code

Status in linux package in Ubuntu:
  New

Bug description:
  [Impact]
  The copy_{to,from}_user implementations in the Ubuntu kernel are suboptimal. Optimized implementations have been submitted upstream and have shown a significant improvement in network performance.

  [Test Case]
  Generate traffic from one node to another using iperf.

  [Regression Risk]
  These functions are obviously used heavily throughout the kernel, so a defect here could have significant impact. This risk is mitigated by using an implementation heavily based on the linaro string libraries (which are used in other places already, e.g. glibc), and through active testing of this patch on real hardware using a trusty-kernel base. The new patch will also undergo regression testing to ensure the memory corruption issue of the previous patch does not exist.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400349/+subscriptions


Follow ups

References