Bug 648333
Summary: | TCP checksum overflows in qemu's e1000 emulation code when TSO is enabled in guest OS | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Mark Wu <dwu> |
Component: | qemu-kvm | Assignee: | Alex Williamson <alex.williamson> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 6.0 | CC: | akong, ehabkost, mjenner, mkenneth, virt-maint, ykaul |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | qemu-kvm-0.12.1.2-2.119.el6 | Doc Type: | Bug Fix |
Doc Text: |
Cause: when TSO is enabled, the e1000 emulation code was not properly accounting for overflow when adding the length to the pseudo header.
Consequence: poor performance of e1000 emulation when using TSO.
Fix: Fix TCP checksum overflow with TSO on e1000 emulation code.
Result: improved performance of e1000 emulation when using TSO.
|
Story Points: | --- |
Clone Of: | 648328 | Environment: | |
Last Closed: | 2011-05-19 11:23:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 648328 | ||
Bug Blocks: | 580954 |
Description
Mark Wu
2010-11-01 02:59:10 UTC
Could not reproduce this bug with qemu-kvm-0.12.1.2-2.113.el6.x86_64 and qemu-kvm-0.12.1.2-2.129.el6.x86_64. The speeds are all about 12 M/s. This bug is cloned from 5.5, so can I moving it to VERIFIED ? Amos, that seems odd that the original slow speed problem doesn't exist on rhel6, the code is very similar here. Did you follow the same steps as https://bugzilla.redhat.com/show_bug.cgi?id=648328#c9? (In reply to comment #6) > Amos, that seems odd that the original slow speed problem doesn't exist on > rhel6, the code is very similar here. Did you follow the same steps as > https://bugzilla.redhat.com/show_bug.cgi?id=648328#c9? Yes. Can I moving this bug to VERIFIED ? Yes, let's move to VERIFIED since this was originally cloned from a rhel5 bz. The change shows no regression and keeps us in sync with both rhel5 and upstream. According to comment #9, Moving this bug to VERIFIED. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Cause: when TSO is enabled, the e1000 emulation code was not properly accounting for overflow when adding the length to the pseudo header. Consequence: poor performance of e1000 emulation when using TSO. Fix: Fix TCP checksum overflow with TSO on e1000 emulation code. Result: improved performance of e1000 emulation when using TSO. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0534.html An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0534.html |