Affected users:
- All Debian 3.5.1 users
- CentOS 3.5.1 users with interfaces and sub-interfaces with the same
leading characters (ex: eth0, eth0.100)
Apply the attached patch with:
$ cd /usr/local/pf/
$ patch -p1 < <patchfile>
All the details here:
http://packetfence.org/bugs/view.php?id=1545
--
Olivier Bilodeau
[email protected] :: +1.514.447.4918 *115 :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
commit 4e7e8a8123ef2fab1ba3a4bca348d4083d683d40
Author: Olivier Bilodeau <[email protected]>
Date: Tue Sep 11 14:28:51 2012 -0400
matching exact line with pgrep instead of partial match (#1545)
Fixes regression when you have VLAN interface on a top interface also
managed (ex: eth0 vs eth0.100) and on Debian no matter the case.
http://packetfence.org/bugs/view.php?id=1545
diff --git a/lib/pf/services.pm b/lib/pf/services.pm
index e88962f..36d287a 100644
--- a/lib/pf/services.pm
+++ b/lib/pf/services.pm
@@ -246,7 +246,8 @@ sub service_ctl {
my $dead_flag;
foreach my $interface (keys %int_to_pid) {
- chomp($int_to_pid{$interface} = `pgrep -f "$binary: listening on $interface"`);
+ # -f: whole command line, -x: exact match (fixes #1545)
+ chomp($int_to_pid{$interface} = `pgrep -f -x "$binary: listening on $interface"`);
# if one check returned a false value ('' is false) then we failed the check
$dead_flag = $TRUE if (!$int_to_pid{$interface});
}
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users