Bug 2122678
Summary: | firewalld ipsets trigger kernel deprecation notice | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Eric Garver <egarver> |
Component: | firewalld | Assignee: | Eric Garver <egarver> |
Status: | CLOSED ERRATA | QA Contact: | Jiri Peska <jpeska> |
Severity: | medium | Docs Contact: | Marc Muehlfeld <mmuehlfe> |
Priority: | high | ||
Version: | 9.1 | CC: | jmaxwell, jpeska, todoleza |
Target Milestone: | rc | Keywords: | TestCaseProvided, Triaged, Upstream |
Target Release: | --- | Flags: | pm-rhel:
mirror+
|
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | firewalld-1.2.1-1.el9 | Doc Type: | Bug Fix |
Doc Text: |
.The `firewalld` service now triggers the `ipset` deprecation warning only when using direct rules
Previously, the `firewalld` service used the deprecated `ipset` kernel module when it was not necessary. Consequently, RHEL logged the module's deprecation warning which could be misleading because the `ipset` feature of `firewalld` is not deprecated. With this update, `firewalld` only uses the deprecated `ipset` module and logs the warning if the user explicitly uses `ipsets` with the `--direct` option.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-09 08:24:12 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2125371 | ||
Bug Blocks: |
Description
Eric Garver
2022-08-30 14:59:07 UTC
Upstream commits: f510855ae501 ("test(ipset): verify native ipset creation is deferred") cdd015475e83 ("fix(ipset): defer native ipset creation if nftables") 4cff68200be9 ("test(functions): add IPSET_LIST_SET_ALWAYS") 79032494e1e9 ("fix(failsafe): log exception on fatal failure") Dropping from the RPL..Not enough votes.. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (firewalld bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:2546 |