[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug #567901: works for me



On Mon, 2010-06-21 at 23:25 +1000, Russell Coker wrote:
> killall -1 auditd gives the following:
> type=DAEMON_CONFIG msg=audit(1277126468.809:6233) config changed, auid=0 
> pid=9667 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 
> res=success
> 
> killall -1 auditd rotated the logs and put the following in the new log:
> 
> type=DAEMON_ROTATE msg=audit(1277126638.865:3190): auditd sending auid=0 
> pid=9724 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
> 
> 
> So it all seems to work for me.  I suggest that the maintainer close this 
> unless we get some more information or he can reproduce it on his system.

We're seeing the same symptoms as the original submitter - i.e. sending
signals to auditd results in "Error sending signal_info request
(Operation not supported)" in syslog and errors in the audit log - using
current lenny auditd and kernel packages.

One obvious difference between the systems we're seeing it on and the
system above is that our systems don't have SELinux installed; I'd
suspect that the submitter doesn't either.

This appears to have been fixed upstream last year, as
939cbf260c1abce6cad4b95ea4ba9f5132b660b3 in Linus's tree.

Kernel maintainers (BCCed) - is there any likelihood that this might
qualify for inclusion in a future stable kernel update?

Regards,

Adam


Reply to: