Public bug reported:

[Impact]
Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" in 
ethtool) to be disabled by default, yet previously it was enabled.

[Fix]
Backport upstream patch to fix the regression

[Testcase]
Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed 
package.

[Regression Potential]
Link features were incorrectly initialised, this fix changes the initialisation 
code back to the correct default values. This changes the defaults back to what 
they are in all other releases. Users on zesty release may have been accustomed 
to the wrong defaults and may need to adjust .link files to e.g. disable tso if 
that is the behavior they want.

** Affects: systemd
     Importance: Unknown
         Status: Unknown

** Affects: systemd (Ubuntu)
     Importance: Undecided
         Status: Fix Released

** Affects: systemd (Ubuntu Zesty)
     Importance: Medium
     Assignee: Dimitri John Ledkov (xnox)
         Status: Confirmed

** Affects: systemd (Debian)
     Importance: Undecided
         Status: New

** Bug watch added: Debian Bug tracker #864073
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864073

** Changed in: systemd (Debian)
 Remote watch: None => Debian Bug tracker #864073

** Also affects: systemd (Ubuntu Zesty)
   Importance: Undecided
       Status: New

** Changed in: systemd (Ubuntu)
       Status: New => Fix Released

** Changed in: systemd (Ubuntu Zesty)
       Status: New => Confirmed

** Changed in: systemd (Ubuntu Zesty)
     Assignee: (unassigned) => Dimitri John Ledkov (xnox)

** Changed in: systemd (Ubuntu Zesty)
    Milestone: None => zesty-updates

** Changed in: systemd (Ubuntu Zesty)
   Importance: Undecided => Medium

** Bug watch added: github.com/systemd/systemd/issues #4650
   https://github.com/systemd/systemd/issues/4650

** Also affects: systemd via
   https://github.com/systemd/systemd/issues/4650
   Importance: Unknown
       Status: Unknown

** Description changed:

- Imported from Debian bug http://bugs.debian.org/864073:
+ [Impact]
+ Regression in systemd v232 resulted in IPv4 TCP segmentation offload ("tso" 
in ethtool) to be disabled by default, yet previously it was enabled.
  
- Received: (at submit) by bugs.debian.org; 3 Jun 2017 23:56:35 +0000
- From hkba...@gmail.com Sat Jun 03 23:56:35 2017
- X-Spam-Checker-Version: SpamAssassin 3.4.0-bugs.debian.org_2005_01_02
-       (2014-02-07) on buxtehude.debian.org
- X-Spam-Level: 
- X-Spam-Status: No, score=-7.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
-       DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HAS_PACKAGE,HTML_MESSAGE,MULTALT,
-       MURPHY_DRUGS_REL8,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_CNKR,VERSION 
autolearn=ham
-       autolearn_force=no version=3.4.0-bugs.debian.org_2005_01_02
- X-Spam-Bayes: score:0.0000 Tokens: new, 34; hammy, 129; neutral, 51; spammy,
-       1. spammytokens:0.937-+--H*c:alternative hammytokens:0.000-+--systemd,
-       0.000-+--H*RU:232, 0.000-+--Hx-spam-relays-external:232, 
0.000-+--ethtool,
-       0.000-+--Severity
- Return-path: <hkba...@gmail.com>
- Received: from mail-oi0-x232.google.com ([2607:f8b0:4003:c06::232])
-       by buxtehude.debian.org with esmtps 
(TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)
-       (Exim 4.84_2)
-       (envelope-from <hkba...@gmail.com>)
-       id 1dHIuJ-0007iH-Kl
-       for sub...@bugs.debian.org; Sat, 03 Jun 2017 23:56:35 +0000
- Received: by mail-oi0-x232.google.com with SMTP id l18so126707621oig.2
-         for <sub...@bugs.debian.org>; Sat, 03 Jun 2017 16:56:35 -0700 (PDT)
- DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
-         d=gmail.com; s=20161025;
-         h=mime-version:from:date:message-id:subject:to;
-         bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
-         b=EWkqFcZK7Kkfwtk661e1D8cmK+WwRDrg+sMFsg2tImUjaeG5/BdKTC+6hNkNnxSQB0
-          /O65qCiNFIi0aI62FYoxv7IPN4276UB0v2Df7sI/JYTUJsAXCY+Ta8/ertXL7kGB30TQ
-          zuvtvbIpZzCjaMx23BQ5YGI/axd/4XK4ue3m1vHFx9OkNc5+CdIeS/ZshIgDqv6RaLfb
-          SERlSH1tRs8h+wwoG3UVtcJAIgr60N17hJAM6W02AtdOhApM3Dtr1xZ/ised74S3yuhE
-          diiH14LL5dczRdU+vRBIHMHvCe09IQFL/cQUQ3uwkSV8LkfY5ZzHrVEukF3Waf2k8Fu1
-          4VGw==
- X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
-         d=1e100.net; s=20161025;
-         h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
-         bh=P2s8Tvq4CKfz8W5Y78Uo8cfNYa4L2UwP9RdxKouji8g=;
-         b=LDYps3bKd1vchc/VgOT/jCUYUr67qu+1u8lQXVzypiMHy3hq2YROHyllwonrwRZ6SF
-          QdjjAFfrYdDYrY5Q+9EXaIqQ+WhVibhWqva9U/jiMVLv28yyMtdhqILepvsBMhCOPl2D
-          RSTff+8AqTky8tfMzsbBH8ThVs+hleVCpP1jIWq6/xJQch9oQeFM0vaAJjVLVRZVFGIS
-          AdXGpJj98i4vKecSUZzqFDxdXE34ehRH+k9DeEWP3dfdIHa7GWxkAcJ8kFwuKSY3pc/t
-          gIhYbpNI5rMofNJSAJgS2hy74JpG+lnn6KtJeC0JoTuB38EfvAdm17z+kMrAjsSNWJv/
-          hgkw==
- X-Gm-Message-State: AODbwcAjYRNipjL/v3Tu9K7r4EQ6JybB9Hg9Lo1nUqCPRkD6BAocantB
-       3aK1M/erRNk6IUSwrjZZXlP+YVChyPk3bVQ=
- X-Received: by 10.202.215.4 with SMTP id o4mr8080572oig.86.1496534188802; Sat,
-  03 Jun 2017 16:56:28 -0700 (PDT)
- MIME-Version: 1.0
- Received: by 10.157.19.53 with HTTP; Sat, 3 Jun 2017 16:56:28 -0700 (PDT)
- From: Hans-Kristian Bakke <hkba...@gmail.com>
- Date: Sun, 4 Jun 2017 01:56:28 +0200
- Message-ID: 
<CAD_cGvF9JVKquPhZ95owhUe2m+cdaxzf=ww1gvp_sgxtcbr...@mail.gmail.com>
- Subject: TCP offloads disabled by default
- To: sub...@bugs.debian.org
- Content-Type: multipart/alternative; boundary="001a113d5154b7da370551170435"
- Delivered-To: sub...@bugs.debian.org
+ [Fix]
+ Backport upstream patch to fix the regression
+ 
+ [Testcase]
+ Use ethtool to verify that tso is enabled on e.g. e1000e card with fixed 
package.
+ 
+ [Regression Potential]
+ Link features were incorrectly initialised, this fix changes the 
initialisation code back to the correct default values. This changes the 
defaults back to what they are in all other releases. Users on zesty release 
may have been accustomed to the wrong defaults and may need to adjust .link 
files to e.g. disable tso if that is the behavior they want.

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1703393

Title:
  TCP offloads disabled by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/systemd/+bug/1703393/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to