Parsed ifcg-eth0 file that is going to be converted to a network interface config on the guest
** Description changed: This bug is a continuation to bug ID 1506521 - the refreshed hv_set_ifconfig script in Python3. On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored. It gets set to a default of 255.0.0.0. Kernel: 4.2.0-23-generic Generated ifcfg-eth0 file: /var/lib/hyperv/ifcfg-eth0 Sample contents: HWADDR=00:15:5D:XX:XX:XX DEVICE=eth0 BOOTPROTO=none IPADDR0=10.123.120.12 NETMASK0=255.255.254.0 GATEWAY=10.123.119.1 DNS1=anything + + syslog doesn't record any related events to the netmask, and also + manually executing hv_set_ifconfig against the generated ifcfg works + with no errors. + + The interfaces files gets modified to this: + iface eth0 inet static + address 10.123.120.199 + gateway 10.123.119.1 + dns-nameservers anything_changed + + #End of hv_set_ifconfig stanzas ** Description changed: This bug is a continuation to bug ID 1506521 - the refreshed hv_set_ifconfig script in Python3. On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored. It gets set to a default of 255.0.0.0. Kernel: 4.2.0-23-generic - Generated ifcfg-eth0 file: - /var/lib/hyperv/ifcfg-eth0 - - Sample contents: - HWADDR=00:15:5D:XX:XX:XX - DEVICE=eth0 - BOOTPROTO=none - IPADDR0=10.123.120.12 - NETMASK0=255.255.254.0 - GATEWAY=10.123.119.1 - DNS1=anything + Attaching generated ifcfg-eth0 file that is used by this script. syslog doesn't record any related events to the netmask, and also manually executing hv_set_ifconfig against the generated ifcfg works with no errors. The interfaces files gets modified to this: iface eth0 inet static - address 10.123.120.199 - gateway 10.123.119.1 - dns-nameservers anything_changed + address 10.123.120.199 + gateway 10.123.119.1 + dns-nameservers anything_changed #End of hv_set_ifconfig stanzas ** Attachment added: "ifcfg-eth0.txt" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+attachment/4561635/+files/ifcfg-eth0.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Summary changed: - Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection + [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540586 Title: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection Status in linux package in Ubuntu: Confirmed Bug description: This bug is a continuation to bug ID 1506521 - the refreshed hv_set_ifconfig script in Python3. On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored. It gets set to a default of 255.0.0.0. Kernel: 4.2.0-23-generic Attaching generated ifcfg-eth0 file that is used by this script. syslog doesn't record any related events to the netmask, and also manually executing hv_set_ifconfig against the generated ifcfg works with no errors. The interfaces files gets modified to this: iface eth0 inet static address 10.123.120.199 gateway 10.123.119.1 dns-nameservers anything_changed #End of hv_set_ifconfig stanzas To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp