$ dpkg -l | grep 229-4 ii libpam-systemd:amd64 229-4ubuntu21 amd64 system and service manager - PAM module ii libsystemd-dev:amd64 229-4ubuntu21 amd64 systemd utility library - development files ii libsystemd0:amd64 229-4ubuntu21 amd64 systemd utility library ii libudev-dev:amd64 229-4ubuntu21 amd64 libudev development files ii libudev1:amd64 229-4ubuntu21 amd64 libudev shared library ii systemd 229-4ubuntu21 amd64 system and service manager ii systemd-sysv 229-4ubuntu21 amd64 system and service manager - SysV links ii udev 229-4ubuntu21 amd64 /dev/ and hotplug management daemon
Executed the attached regression-apr.sh script against my eht0 interface, all 4 test cases reported good. Previously at least one of them failed. ** Tags removed: verification-needed verification-needed-xenial ** Tags added: verification-done verification-done-xenial ** Description changed: [Impact] * Setting [Link] MTUBytes= in .network file has a side-effect of overflowing and setting NOARP flag. This is not intended behaviour / regression. * Trying to fix above by setting ARP=on fails to work as tristate is incorrectly acted upon by unconditionally adding NOARP flag * This is a regression in -updates. + + [Affected Users] + + * Those who use networkd + + * Do not use netplan (as that sets mtubytes in the .link files, not in the .network) + + * Specify MTUBytes in .network file (not in the .link file) [Test Case] * Configure an ethernet device with a .network file alone * e.g. Match by mac address and perform DHCP * Add [Link] section to the .network file which changes MTUBytes * Device brought up using this configuration should not have NOAPR flag in the output of iproute link output * Further add ARP=off to that .network file, the link should have NOARP flag * Further add ARP=on to that .network file, the link should not have NOARP flag A test script is attached, that given an interface can abuse it to validate all of the above. [Regression Potential] * These are upstream fixes for ARP= key that are part of zesty and up [Other Info] * Upstream fixes https://github.com/systemd/systemd/commit/b8b40317d0355bc70bb23a6240a36f3630c4952b.patch https://github.com/systemd/systemd/commit/1ed1f50f8277df07918e13cba3331a114eaa6fe3.patch * Original bug report this breaks existing configurations with bonding on upgrading from 229-4ubuntu19 to 229-4ubuntu20 on xenial as bond interfaces are now by default configured without ARP. Hence you suddenly lose network connectivity on upgrade. Very bad for a SRU. Plus adding "ARP=yes" to the Link section of a .network file does not work. Before this update, bond interfaces (specifically 802.3ad) were defaulting to ARP enabled. After the upgrade, they are created with NOARP set on the link. pre-upgrade: eth0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> eth1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> bond0: <BROADCAST,MULTICAST,MASTER,UP,LOWER_UP> post-upgrade: eth0: <BROADCAST,MULTICAST,NOARP,SLAVE,UP,LOWER_UP> eth1: <BROADCAST,MULTICAST,NOARP,SLAVE,UP,LOWER_UP> bond0: <BROADCAST,MULTICAST,NOARP,MASTER,UP,LOWER_UP> Linux cnode11 4.4.0-97-generic #120-Ubuntu SMP Tue Sep 19 17:28:18 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1727301 Title: 229-4ubuntu20 added ARP option breaks existing bonding interfaces To manage notifications about this bug go to: https://bugs.launchpad.net/systemd/+bug/1727301/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs