← Back to team overview

kernel-packages team mailing list archive

[Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

 

This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
          address 10.123.120.199
          gateway 10.123.119.1
          dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions


References