Public bug reported: [Impact] Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled.
[Fix] Backport upstream patch to fix the regression [Testcase] Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package. [Regression Potential] Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want. ** Affects: systemd Importance: Unknown Status: Unknown ** Affects: systemd (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: systemd (Ubuntu Zesty) Importance: Medium Assignee: Dimitri John Ledkov (xnox) Status: Confirmed ** Affects: systemd (Debian) Importance: Undecided Status: New ** Bug watch added: Debian Bug tracker #864073 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864073 ** Changed in: systemd (Debian) Remote watch: None => Debian Bug tracker #864073 ** Also affects: systemd (Ubuntu Zesty) Importance: Undecided Status: New ** Changed in: systemd (Ubuntu) Status: New => Fix Released ** Changed in: systemd (Ubuntu Zesty) Status: New => Confirmed ** Changed in: systemd (Ubuntu Zesty) Assignee: (unassigned) => Dimitri John Ledkov (xnox) ** Changed in: systemd (Ubuntu Zesty) Milestone: None => zesty-updates ** Changed in: systemd (Ubuntu Zesty) Importance: Undecided => Medium ** Bug watch added: github.com/systemd/systemd/issues #4650 https://github.com/systemd/systemd/issues/4650 ** Also affects: systemd via https://github.com/systemd/systemd/issues/4650 Importance: Unknown Status: Unknown ** Description changed: - Imported from Debian bug http://bugs.debian.org/864073: + [Impact] + Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in ethtool) to be disabled by default, yet previously it was enabled. - Received: (at submit) by bugs.debian.org; 3 Jun 2017 23:56:35 +0000 - From hkba...@gmail.com Sat Jun 03 23:56:35 2017 - X-Spam-Checker-Version: SpamAssassin 3.4.0-bugs.debian.org_2005_01_02 - (2014-02-07) on buxtehude.debian.org - X-Spam-Level: - X-Spam-Status: No, score=-7.9 required=4.0 tests=BAYES_00,DKIM_SIGNED, - DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HAS_PACKAGE,HTML_MESSAGE,MULTALT, - MURPHY_DRUGS_REL8,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_CNKR,VERSION autolearn=ham - autolearn_force=no version=3.4.0-bugs.debian.org_2005_01_02 - X-Spam-Bayes: score:0.0000 Tokens: new, 34; hammy, 129; neutral, 51; spammy, - 1. spammytokens:0.937-+--H*c:alternative hammytokens:0.000-+--systemd, - 0.000-+--H*RU:232, 0.000-+--Hx-spam-relays-external:232, 0.000-+--ethtool, - 0.000-+--Severity - Return-path: <hkba...@gmail.com> - Received: from mail-oi0-x232.google.com ([2607:f8b0:4003:c06::232]) - by buxtehude.debian.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) - (Exim 4.84_2) - (envelope-from <hkba...@gmail.com>) - id 1dHIuJ-0007iH-Kl - for sub...@bugs.debian.org; Sat, 03 Jun 2017 23:56:35 +0000 - Received: by mail-oi0-x232.google.com with SMTP id l18so126707621oig.2 - for <sub...@bugs.debian.org>; Sat, 03 Jun 2017 16:56:35 -0700 (PDT) - DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; - d=gmail.com; s=20161025; - h=mime-version:from:date:message-id:subject:to; - bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=; - b=EWkqFcZK7Kkfwtk661e1D8cmK+WwRDrg+sMFsg2tImUjaeG5/BdKTC+6hNkNnxSQB0 - /O65qCiNFIi0aI62FYoxv7IPN4276UB0v2Df7sI/JYTUJsAXCY+Ta8/ertXL7kGB30TQ - zuvtvbIpZzCjaMx23BQ5YGI/axd/4XK4ue3m1vHFx9OkNc5+CdIeS/ZshIgDqv6RaLfb - SERlSH1tRs8h+wwoG3UVtcJAIgr60N17hJAM6W02AtdOhApM3Dtr1xZ/ised74S3yuhE - diiH14LL5dczRdU+vRBIHMHvCe09IQFL/cQUQ3uwkSV8LkfY5ZzHrVEukF3Waf2k8Fu1 - 4VGw== - X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; - d=1e100.net; s=20161025; - h=x-gm-message-state:mime-version:from:date:message-id:subject:to; - bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=; - b=LDYps3bKd1vchc/VgOT/jCUYUr67qu+1u8lQXVzypiMHy3hq2YROHyllwonrwRZ6SF - QdjjAFfrYdDYrY5Q+9EXaIqQ+WhVibhWqva9U/jiMVLv28yyMtdhqILepvsBMhCOPl2D - RSTff+8AqTky8tfMzsbBH8ThVs+hleVCpP1jIWq6/xJQch9oQeFM0vaAJjVLVRZVFGIS - AdXGpJj98i4vKecSUZzqFDxdXE34ehRH+k9DeEWP3dfdIHa7GWxkAcJ8kFwuKSY3pc/t - gIhYbpNI5rMofNJSAJgS2hy74JpG+lnn6KtJeC0JoTuB38EfvAdm17z+kMrAjsSNWJv/ - hgkw== - X-Gm-Message-State: AODbwcAjYRNipjL/v3Tu9K7r4EQ6JybB9Hg9Lo1nUqCPRkD6BAocantB - 3aK1M/erRNk6IUSwrjZZXlP+YVChyPk3bVQ= - X-Received: by 10.202.215.4 with SMTP id o4mr8080572oig.86.1496534188802; Sat, - 03 Jun 2017 16:56:28 -0700 (PDT) - MIME-Version: 1.0 - Received: by 10.157.19.53 with HTTP; Sat, 3 Jun 2017 16:56:28 -0700 (PDT) - From: Hans-Kristian Bakke <hkba...@gmail.com> - Date: Sun, 4 Jun 2017 01:56:28 +0200 - Message-ID: <CAD_cGvF9JVKquPhZ95owhUe2m+cdaxzf=ww1gvp_sgxtcbr...@mail.gmail.com> - Subject: TCP offloads disabled by default - To: sub...@bugs.debian.org - Content-Type: multipart/alternative; boundary="001a113d5154b7da370551170435" - Delivered-To: sub...@bugs.debian.org + [Fix] + Backport upstream patch to fix the regression + + [Testcase] + Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed package. + + [Regression Potential] + Link features were incorrectly initialised, this fix changes the initialisation code back to the correct default values. This changes the defaults back to what they are in all other releases. Users on zesty release may have been accustomed to the wrong defaults and may need to adjust .link files to e.g. disable tso if that is the behavior they want. -- You received this bug notification because you are a member of Ubuntu Desktop Bugs, which is subscribed to systemd in Ubuntu. https://bugs.launchpad.net/bugs/1703393 Title: TCP offloads disabled by default To manage notifications about this bug go to: https://bugs.launchpad.net/systemd/+bug/1703393/+subscriptions -- desktop-bugs mailing list desktop-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/desktop-bugs