[Bug 229381] reads to /dev/audit aren't interruptible

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Thu Jun 28 04:16:16 UTC 2018


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229381

            Bug ID: 229381
           Summary: reads to /dev/audit aren't interruptible
           Product: Base System
           Version: CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: kern
          Assignee: bugs at FreeBSD.org
          Reporter: asomers at FreeBSD.org

auditd(8) assumes that read(2)s of /dev/audit are interruptible by signals.  It
relies on these reads being interrupted by SIGCHLD, SIGTERM, and SIGHUP. 
However, reads of this device aren't actually interruptible.  I don't know why,
because audit_read _looks_ like it's doing the right thing.

Symptoms:
1) Sending SIGTERM to auditd doesn't kill it right away; you might send SIGTERM
and then send a trigger with auditon(2).
2) Same with SIGHUP
3) Zombie child processes don't get reaped until auditd receives a trigger sent
by auditon.  This includes children created by expiring audit trails at auditd
startup.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-bugs mailing list