On Mon, 2010-06-21 at 23:25 +1000, Russell Coker wrote: > killall -1 auditd gives the following: > type=DAEMON_CONFIG msg=audit(1277126468.809:6233) config changed, auid=0 > pid=9667 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 > res=success > > killall -1 auditd rotated the logs and put the following in the new log: > > type=DAEMON_ROTATE msg=audit(1277126638.865:3190): auditd sending auid=0 > pid=9724 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 > > > So it all seems to work for me. I suggest that the maintainer close this > unless we get some more information or he can reproduce it on his system.
We're seeing the same symptoms as the original submitter - i.e. sending signals to auditd results in "Error sending signal_info request (Operation not supported)" in syslog and errors in the audit log - using current lenny auditd and kernel packages. One obvious difference between the systems we're seeing it on and the system above is that our systems don't have SELinux installed; I'd suspect that the submitter doesn't either. This appears to have been fixed upstream last year, as 939cbf260c1abce6cad4b95ea4ba9f5132b660b3 in Linus's tree. Kernel maintainers (BCCed) - is there any likelihood that this might qualify for inclusion in a future stable kernel update? Regards, Adam -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1277230448.14156.303.ca...@kaa.jungle.aubergine.my-net-space.net