[Bug 1703393] [NEW] TCP offloads disabled by default
Dimitri John Ledkov
launchpad at surgut.co.uk
Mon Jul 10 14:47:52 UTC 2017
Public bug reported:
[Impact]
Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.
[Fix]
Backport upstream patch to fix the regression
[Testcase]
Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.
[Regression Potential]
Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.
** Affects: systemd
Importance: Unknown
Status: Unknown
** Affects: systemd (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: systemd (Ubuntu Zesty)
Importance: Medium
Assignee: Dimitri John Ledkov (xnox)
Status: Confirmed
** Affects: systemd (Debian)
Importance: Undecided
Status: New
** Bug watch added: Debian Bug tracker #864073
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864073
** Changed in: systemd (Debian)
Remote watch: None => Debian Bug tracker #864073
** Also affects: systemd (Ubuntu Zesty)
Importance: Undecided
Status: New
** Changed in: systemd (Ubuntu)
Status: New => Fix Released
** Changed in: systemd (Ubuntu Zesty)
Status: New => Confirmed
** Changed in: systemd (Ubuntu Zesty)
Assignee: (unassigned) => Dimitri John Ledkov (xnox)
** Changed in: systemd (Ubuntu Zesty)
Milestone: None => zesty-updates
** Changed in: systemd (Ubuntu Zesty)
Importance: Undecided => Medium
** Bug watch added: github.com/systemd/systemd/issues #4650
https://github.com/systemd/systemd/issues/4650
** Also affects: systemd via
https://github.com/systemd/systemd/issues/4650
Importance: Unknown
Status: Unknown
** Description changed:
- Imported from Debian bug http://bugs.debian.org/864073:
+ [Impact]
+ Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.
- Received: (at submit) by bugs.debian.org; 3 Jun 2017 23:56:35 +0000
- From hkbakke at gmail.com Sat Jun 03 23:56:35 2017
- X-Spam-Checker-Version: SpamAssassin 3.4.0-bugs.debian.org_2005_01_02
- (2014-02-07) on buxtehude.debian.org
- X-Spam-Level:
- X-Spam-Status: No, score=-7.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
- DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HAS_PACKAGE,HTML_MESSAGE,MULTALT,
- MURPHY_DRUGS_REL8,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_CNKR,VERSION autolearn=ham
- autolearn_force=no version=3.4.0-bugs.debian.org_2005_01_02
- X-Spam-Bayes: score:0.0000 Tokens: new, 34; hammy, 129; neutral, 51; spammy,
- 1. spammytokens:0.937-+--H*c:alternative hammytokens:0.000-+--systemd,
- 0.000-+--H*RU:232, 0.000-+--Hx-spam-relays-external:232, 0.000-+--ethtool,
- 0.000-+--Severity
- Return-path: <hkbakke at gmail.com>
- Received: from mail-oi0-x232.google.com ([2607:f8b0:4003:c06::232])
- by buxtehude.debian.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
- (Exim 4.84_2)
- (envelope-from <hkbakke at gmail.com>)
- id 1dHIuJ-0007iH-Kl
- for submit at bugs.debian.org; Sat, 03 Jun 2017 23:56:35 +0000
- Received: by mail-oi0-x232.google.com with SMTP id l18so126707621oig.2
- for <submit at bugs.debian.org>; Sat, 03 Jun 2017 16:56:35 -0700 (PDT)
- DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
- d=gmail.com; s=20161025;
- h=mime-version:from:date:message-id:subject:to;
- bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
- b=EWkqFcZK7Kkfwtk661e1D8cmK+WwRDrg+sMFsg2tImUjaeG5/BdKTC+6hNkNnxSQB0
- /O65qCiNFIi0aI62FYoxv7IPN4276UB0v2Df7sI/JYTUJsAXCY+Ta8/ertXL7kGB30TQ
- zuvtvbIpZzCjaMx23BQ5YGI/axd/4XK4ue3m1vHFx9OkNc5+CdIeS/ZshIgDqv6RaLfb
- SERlSH1tRs8h+wwoG3UVtcJAIgr60N17hJAM6W02AtdOhApM3Dtr1xZ/ised74S3yuhE
- diiH14LL5dczRdU+vRBIHMHvCe09IQFL/cQUQ3uwkSV8LkfY5ZzHrVEukF3Waf2k8Fu1
- 4VGw==
- X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
- d=1e100.net; s=20161025;
- h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
- bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
- b=LDYps3bKd1vchc/VgOT/jCUYUr67qu+1u8lQXVzypiMHy3hq2YROHyllwonrwRZ6SF
- QdjjAFfrYdDYrY5Q+9EXaIqQ+WhVibhWqva9U/jiMVLv28yyMtdhqILepvsBMhCOPl2D
- RSTff+8AqTky8tfMzsbBH8ThVs+hleVCpP1jIWq6/xJQch9oQeFM0vaAJjVLVRZVFGIS
- AdXGpJj98i4vKecSUZzqFDxdXE34ehRH+k9DeEWP3dfdIHa7GWxkAcJ8kFwuKSY3pc/t
- gIhYbpNI5rMofNJSAJgS2hy74JpG+lnn6KtJeC0JoTuB38EfvAdm17z+kMrAjsSNWJv/
- hgkw==
- X-Gm-Message-State: AODbwcAjYRNipjL/v3Tu9K7r4EQ6JybB9Hg9Lo1nUqCPRkD6BAocantB
- 3aK1M/erRNk6IUSwrjZZXlP+YVChyPk3bVQ=
- X-Received: by 10.202.215.4 with SMTP id o4mr8080572oig.86.1496534188802; Sat,
- 03 Jun 2017 16:56:28 -0700 (PDT)
- MIME-Version: 1.0
- Received: by 10.157.19.53 with HTTP; Sat, 3 Jun 2017 16:56:28 -0700 (PDT)
- From: Hans-Kristian Bakke <hkbakke at gmail.com>
- Date: Sun, 4 Jun 2017 01:56:28 +0200
- Message-ID: <CAD_cGvF9JVKquPhZ95owhUe2m+cdaxzf=wW1GvP_sgXtcbRBJQ at mail.gmail.com>
- Subject: TCP offloads disabled by default
- To: submit at bugs.debian.org
- Content-Type: multipart/alternative; boundary="001a113d5154b7da370551170435"
- Delivered-To: submit at bugs.debian.org
+ [Fix]
+ Backport upstream patch to fix the regression
+
+ [Testcase]
+ Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.
+
+ [Regression Potential]
+ Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1703393
Title:
TCP offloads disabled by default
Status in systemd:
Unknown
Status in systemd package in Ubuntu:
Fix Released
Status in systemd source package in Zesty:
Confirmed
Status in systemd package in Debian:
New
Bug description:
[Impact]
Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.
[Fix]
Backport upstream patch to fix the regression
[Testcase]
Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.
[Regression Potential]
Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.
To manage notifications about this bug go to:
https://bugs.launchpad.net/systemd/+bug/1703393/+subscriptions
More information about the foundations-bugs
mailing list