kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #159936
[Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection
@Chris -- ok this script is basic broken in just about every possible
way. I am attaching a majorly reworked version which attempts to fix
this mess up. Could you test this one and let me know how you fair with
it.
** Attachment added: "hv_set_ifconfig"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+attachment/4567716/+files/hv_set_ifconfig
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586
Title:
[Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
injection
Status in linux package in Ubuntu:
Confirmed
Status in linux source package in Wily:
Confirmed
Status in linux source package in Xenial:
Confirmed
Bug description:
This bug is a continuation to bug ID 1506521 - the refreshed
hv_set_ifconfig script in Python3.
On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored.
It gets set to a default of 255.0.0.0.
Kernel: 4.2.0-23-generic
Attaching generated ifcfg-eth0 file that is used by this script.
syslog doesn't record any related events to the netmask, and also
manually executing hv_set_ifconfig against the generated ifcfg works
with no errors.
The interfaces files gets modified to this:
iface eth0 inet static
address 10.123.120.199
gateway 10.123.119.1
dns-nameservers anything_changed
#End of hv_set_ifconfig stanzas
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions
References