I'd like to perform a kernel bisect to figure out which commit caused
this regression. We need to identify the earliest kernel that did not
exhibit the bug and the first kernel that did exhibit the bug.

Can you test the following kernels and post back?

4.8 final: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.8/
4.9-rc1: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.9-rc1/
4.9 final: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.9/
4.10-rc1: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.10-rc1/
4.10-rc4: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.10-rc4/


You don't have to test every kernel, just up until the kernel that first has 
this bug.

Based on your test results, we can figure out which kernel to test next.

Thanks in advance!

** Also affects: linux (Ubuntu Zesty)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Zesty)
       Status: New => Triaged

** Changed in: linux (Ubuntu)
       Status: Incomplete => Triaged

** Changed in: linux (Ubuntu Zesty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1678585

Title:
  [Zesty] TSO doesn't work properly

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Zesty:
  Triaged

Bug description:
  The TSO (TCP segmentation offload), By default it is shown to be ON, but 
actually aggregation doesn’t happen.
  When turning it on again - aggregation is observed.
  Same behavior for mlx4_en, mlx5_core, igb.

  Steps to repro:
  1.
  root:~# uname -r
  4.10.0-14-generic

  2.
  root:~# ethtool -i eno2
  driver: igb
  version: 5.4.0-k
  firmware-version: 1.63, 0x800009fa
  expansion-rom-version:
  bus-info: 0000:06:00.0
  supports-statistics: yes
  supports-test: yes
  supports-eeprom-access: yes
  supports-register-dump: yes
  supports-priv-flags: no

  3.
  root:~# ethtool -k eno2 | grep offload
  tcp-segmentation-offload: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: on
  generic-receive-offload: on
  large-receive-offload: off [fixed]
  rx-vlan-offload: on
  tx-vlan-offload: on
  l2-fwd-offload: off [fixed]
  hw-tc-offload: off [fixed]

  4.
  root@:~# ethtool -K eno2 gso off

  5.
  root@:~# ethtool -k eno2 | grep offload
  tcp-segmentation-offload: on
  udp-fragmentation-offload: off [fixed]
  generic-segmentation-offload: off
  generic-receive-offload: on
  large-receive-offload: off [fixed]
  rx-vlan-offload: on
  tx-vlan-offload: on
  l2-fwd-offload: off [fixed]
  hw-tc-offload: off [fixed]

  6.
  netperf -H 10.195.43.1 -l 4 -t TCP_STREAM -c -C -- -m 15000
  Traffic size less or equal to 1514 is observed, despite the fact TSO is on.

  7.
  ethtool -K eno2 tso on

  8.
  netperf -H 10.195.43.1 -l 4 -t TCP_STREAM -c -C -- -m 15000
  Traffic size of 64K is observed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1678585/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to