Skip to content

Conversation

@jandryuk
Copy link
Contributor

network-daemon leaks FDs when it runs udhcpc. These are seen as:
avc: denied { read write } for pid=1974 comm="udhcpc" path="socket:[15201]" dev="sockfs" ino=15201 scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:system_r:network_daemon_t:s0 tclass=unix_stream_socket permissive=0
avc: denied { read write } for pid=1974 comm="udhcpc" path="/dev/argo_stream" dev="devtmpfs" ino=14802 scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:object_r:argo_t:s0 tclass=chr_file permissive=0

Those started after commit 836c400 "Use system call instead of
spawning a shell", but that commit does fix an issue where dom0 doesn't
get an IP (udhcpc doesn't start).

Side-step this issue but removing launch of udhcpc. Dom0 will run
ifplugd to start it instead.

network-daemon starts udhcpc as:
udhcpc -b -i eth0 -p /var/run/udhcpc.pid
and ifup uses:
/sbin/udhcpc -R -b -p /var/run/udhcpc.eth0.pid -i eth0

So we gain -R - "Release IP on exit".

Signed-off-by: Jason Andryuk jandryuk@gmail.com

network-daemon leaks FDs when it runs udhcpc.  These are seen as:
avc:  denied  { read write } for  pid=1974 comm="udhcpc" path="socket:[15201]" dev="sockfs" ino=15201 scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:system_r:network_daemon_t:s0 tclass=unix_stream_socket permissive=0
avc:  denied  { read write } for  pid=1974 comm="udhcpc" path="/dev/argo_stream" dev="devtmpfs" ino=14802 scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:object_r:argo_t:s0 tclass=chr_file permissive=0

Those started after commit 836c400 "Use system call instead of
spawning a shell", but that commit does fix an issue where dom0 doesn't
get an IP (udhcpc doesn't start).

Side-step this issue but removing launch of udhcpc.  Dom0 will run
ifplugd to start it instead.

network-daemon starts udhcpc as:
udhcpc -b -i eth0 -p /var/run/udhcpc.pid
and ifup uses:
/sbin/udhcpc -R -b -p /var/run/udhcpc.eth0.pid -i eth0

So we gain -R - "Release IP on exit".

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant