[Bug 1703393] [NEW] TCP offloads disabled by default

Dimitri John Ledkov launchpad at surgut.co.uk
Mon Jul 10 14:47:52 UTC 2017


Public bug reported:

[Impact]
Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.

[Fix]
Backport upstream patch to fix the regression

[Testcase]
Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.

[Regression Potential]
Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.

** Affects: systemd
     Importance: Unknown
         Status: Unknown

** Affects: systemd (Ubuntu)
     Importance: Undecided
         Status: Fix Released

** Affects: systemd (Ubuntu Zesty)
     Importance: Medium
     Assignee: Dimitri John Ledkov (xnox)
         Status: Confirmed

** Affects: systemd (Debian)
     Importance: Undecided
         Status: New

** Bug watch added: Debian Bug tracker #864073
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864073

** Changed in: systemd (Debian)
 Remote watch: None => Debian Bug tracker #864073

** Also affects: systemd (Ubuntu Zesty)
   Importance: Undecided
       Status: New

** Changed in: systemd (Ubuntu)
       Status: New => Fix Released

** Changed in: systemd (Ubuntu Zesty)
       Status: New => Confirmed

** Changed in: systemd (Ubuntu Zesty)
     Assignee: (unassigned) => Dimitri John Ledkov (xnox)

** Changed in: systemd (Ubuntu Zesty)
    Milestone: None => zesty-updates

** Changed in: systemd (Ubuntu Zesty)
   Importance: Undecided => Medium

** Bug watch added: github.com/systemd/systemd/issues #4650
   https://github.com/systemd/systemd/issues/4650

** Also affects: systemd via
   https://github.com/systemd/systemd/issues/4650
   Importance: Unknown
       Status: Unknown

** Description changed:

- Imported from Debian bug http://bugs.debian.org/864073:
+ [Impact]
+ Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.
  
- Received: (at submit) by bugs.debian.org; 3 Jun 2017 23:56:35 +0000
- From hkbakke at gmail.com Sat Jun 03 23:56:35 2017
- X-Spam-Checker-Version: SpamAssassin 3.4.0-bugs.debian.org_2005_01_02
- 	(2014-02-07) on buxtehude.debian.org
- X-Spam-Level: 
- X-Spam-Status: No, score=-7.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
- 	DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HAS_PACKAGE,HTML_MESSAGE,MULTALT,
- 	MURPHY_DRUGS_REL8,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_CNKR,VERSION autolearn=ham
- 	autolearn_force=no version=3.4.0-bugs.debian.org_2005_01_02
- X-Spam-Bayes: score:0.0000 Tokens: new, 34; hammy, 129; neutral, 51; spammy,
- 	1. spammytokens:0.937-+--H*c:alternative hammytokens:0.000-+--systemd,
- 	0.000-+--H*RU:232, 0.000-+--Hx-spam-relays-external:232, 0.000-+--ethtool,
- 	0.000-+--Severity
- Return-path: <hkbakke at gmail.com>
- Received: from mail-oi0-x232.google.com ([2607:f8b0:4003:c06::232])
- 	by buxtehude.debian.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
- 	(Exim 4.84_2)
- 	(envelope-from <hkbakke at gmail.com>)
- 	id 1dHIuJ-0007iH-Kl
- 	for submit at bugs.debian.org; Sat, 03 Jun 2017 23:56:35 +0000
- Received: by mail-oi0-x232.google.com with SMTP id l18so126707621oig.2
-         for <submit at bugs.debian.org>; Sat, 03 Jun 2017 16:56:35 -0700 (PDT)
- DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
-         d=gmail.com; s=20161025;
-         h=mime-version:from:date:message-id:subject:to;
-         bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
-         b=EWkqFcZK7Kkfwtk661e1D8cmK+WwRDrg+sMFsg2tImUjaeG5/BdKTC+6hNkNnxSQB0
-          /O65qCiNFIi0aI62FYoxv7IPN4276UB0v2Df7sI/JYTUJsAXCY+Ta8/ertXL7kGB30TQ
-          zuvtvbIpZzCjaMx23BQ5YGI/axd/4XK4ue3m1vHFx9OkNc5+CdIeS/ZshIgDqv6RaLfb
-          SERlSH1tRs8h+wwoG3UVtcJAIgr60N17hJAM6W02AtdOhApM3Dtr1xZ/ised74S3yuhE
-          diiH14LL5dczRdU+vRBIHMHvCe09IQFL/cQUQ3uwkSV8LkfY5ZzHrVEukF3Waf2k8Fu1
-          4VGw==
- X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
-         d=1e100.net; s=20161025;
-         h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
-         bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
-         b=LDYps3bKd1vchc/VgOT/jCUYUr67qu+1u8lQXVzypiMHy3hq2YROHyllwonrwRZ6SF
-          QdjjAFfrYdDYrY5Q+9EXaIqQ+WhVibhWqva9U/jiMVLv28yyMtdhqILepvsBMhCOPl2D
-          RSTff+8AqTky8tfMzsbBH8ThVs+hleVCpP1jIWq6/xJQch9oQeFM0vaAJjVLVRZVFGIS
-          AdXGpJj98i4vKecSUZzqFDxdXE34ehRH+k9DeEWP3dfdIHa7GWxkAcJ8kFwuKSY3pc/t
-          gIhYbpNI5rMofNJSAJgS2hy74JpG+lnn6KtJeC0JoTuB38EfvAdm17z+kMrAjsSNWJv/
-          hgkw==
- X-Gm-Message-State: AODbwcAjYRNipjL/v3Tu9K7r4EQ6JybB9Hg9Lo1nUqCPRkD6BAocantB
- 	3aK1M/erRNk6IUSwrjZZXlP+YVChyPk3bVQ=
- X-Received: by 10.202.215.4 with SMTP id o4mr8080572oig.86.1496534188802; Sat,
-  03 Jun 2017 16:56:28 -0700 (PDT)
- MIME-Version: 1.0
- Received: by 10.157.19.53 with HTTP; Sat, 3 Jun 2017 16:56:28 -0700 (PDT)
- From: Hans-Kristian Bakke <hkbakke at gmail.com>
- Date: Sun, 4 Jun 2017 01:56:28 +0200
- Message-ID: <CAD_cGvF9JVKquPhZ95owhUe2m+cdaxzf=wW1GvP_sgXtcbRBJQ at mail.gmail.com>
- Subject: TCP offloads disabled by default
- To: submit at bugs.debian.org
- Content-Type: multipart/alternative; boundary="001a113d5154b7da370551170435"
- Delivered-To: submit at bugs.debian.org
+ [Fix]
+ Backport upstream patch to fix the regression
+ 
+ [Testcase]
+ Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.
+ 
+ [Regression Potential]
+ Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1703393

Title:
  TCP offloads disabled by default

Status in systemd:
  Unknown
Status in systemd package in Ubuntu:
  Fix Released
Status in systemd source package in Zesty:
  Confirmed
Status in systemd package in Debian:
  New

Bug description:
  [Impact]
  Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.

  [Fix]
  Backport upstream patch to fix the regression

  [Testcase]
  Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package.

  [Regression Potential]
  Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want.

To manage notifications about this bug go to:
https://bugs.launchpad.net/systemd/+bug/1703393/+subscriptions



More information about the foundations-bugs mailing list