Bug 1557599
Summary: | [RFE] Rebase ipset (kernel) to latest upstream | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Stefano Brivio <sbrivio> |
Component: | kernel | Assignee: | Stefano Brivio <sbrivio> |
kernel sub component: | Netfilter | QA Contact: | yiche <yiche> |
Status: | CLOSED ERRATA | Docs Contact: | Ioanna Gkioka <igkioka> |
Severity: | medium | ||
Priority: | medium | CC: | atragler, igkioka, jiji, lmiksik, network-qe, sbrivio, shuali, sukulkar, yiche |
Version: | 7.5 | Keywords: | FutureFeature, Rebase |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel-3.10.0-894.el7 | Doc Type: | Rebase: Bug Fixes and Enhancements |
Doc Text: |
*ipset* rebased to Linux kernel version 4.17
The *ipset* kernel component has been upgraded to upstream Linux kernel version 4.17 which provides a number of enhancements and bug fixes over the previous version. Notable changes include:
* The following *ipset* types are now supported:
* hash:net,net
* hash:net,port,net
* hash:ip,mark
* hash:mac
* hash:ip,mac
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-10-30 08:49:46 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1445152, 1496859, 1504578, 1541064, 1554861 |
Description
Stefano Brivio
2018-03-17 01:52:20 UTC
Patch(es) committed on kernel repository and an interim kernel build is undergoing testing Patch(es) available on kernel-3.10.0-894.el7 I have run upstream test: git clone git://git.netfilter.org/ipset on kernel-3.10.0-898.el7 and get result: https://beaker.engineering.redhat.com/recipes/5307771#task74304094 all items gone through review result.log,there is only one item failed: Failed test: ./check_klog.sh 10.255.255.64 udp 1025 netiface that because when exec sendip -p ipv4 -id 10.255.255.254 -is 10.255.255.64 -p udp -ud 80 -us 1025 10.255.255.254 there is a few iptables rule remain: Chain OUTPUT (policy ACCEPT 29 packets, 3576 bytes) pkts bytes target prot opt in out source destination 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 match-set test dst,dst LOG flags 0 level 4 prefix "in set netiface: " 1 28 DROP all -- * * 0.0.0.0/0 10.255.255.254 That drop cause sendto() EPERM (Operation not permitted). sendip use RAW socket to generate IP payload. I don't think it's a issue. I also cover these type: - hash:net,net - hash:net,port,net - hash:ip,mark - hash:ip,mac basic function works fine. no issue found. There is a issue hash:mac can't be matched as a destination MAC address. Bug 1607252 Hi Yi Chen, (In reply to yiche from comment #12) > There is a issue hash:mac can't be matched as a destination MAC address. > Bug 1607252 Wouldn't it make sense to keep this as VERIFIED, though, and track the additional issue separately? Ok,We can track it separately. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:3083 |