public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* AUDIT_SIGNAL_INFO
@ 2009-03-23 15:29 Matthew Booth
  2009-03-23 15:43 ` AUDIT_SIGNAL_INFO Steve Grubb
  2009-03-23 17:59 ` AUDIT_SIGNAL_INFO Eric Paris
  0 siblings, 2 replies; 5+ messages in thread
From: Matthew Booth @ 2009-03-23 15:29 UTC (permalink / raw)
  To: linux Audit

Under what circumstances will the RHEL 4 kernel generate a message of
type AUDIT_SIGNAL_INFO? My understanding is that it should be sent when
a process sends a signal to the audit daemon, however I have not
observed that. Any ideas?

Thanks,

Matt
-- 
Matthew Booth, RHCA, RHCSS
Red Hat, Global Professional Services

M:       +44 (0)7977 267231
GPG ID:  D33C3490
GPG FPR: 3733 612D 2D05 5458 8A8A 1600 3441 EA19 D33C 3490

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: AUDIT_SIGNAL_INFO
  2009-03-23 15:29 AUDIT_SIGNAL_INFO Matthew Booth
@ 2009-03-23 15:43 ` Steve Grubb
  2009-03-23 17:59 ` AUDIT_SIGNAL_INFO Eric Paris
  1 sibling, 0 replies; 5+ messages in thread
From: Steve Grubb @ 2009-03-23 15:43 UTC (permalink / raw)
  To: linux-audit; +Cc: Matthew Booth

On Monday 23 March 2009 11:29:45 Matthew Booth wrote:
> nder what circumstances will the RHEL 4 kernel generate a message of
> type AUDIT_SIGNAL_INFO?

When a SIGTERM is sent to the pid that the kernel has registered for the audit 
daemon.

-Steve

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: AUDIT_SIGNAL_INFO
  2009-03-23 15:29 AUDIT_SIGNAL_INFO Matthew Booth
  2009-03-23 15:43 ` AUDIT_SIGNAL_INFO Steve Grubb
@ 2009-03-23 17:59 ` Eric Paris
  2009-03-23 18:01   ` AUDIT_SIGNAL_INFO Matthew Booth
  1 sibling, 1 reply; 5+ messages in thread
From: Eric Paris @ 2009-03-23 17:59 UTC (permalink / raw)
  To: Matthew Booth; +Cc: linux Audit

On Mon, 2009-03-23 at 15:29 +0000, Matthew Booth wrote:
> Under what circumstances will the RHEL 4 kernel generate a message of
> type AUDIT_SIGNAL_INFO? My understanding is that it should be sent when
> a process sends a signal to the audit daemon, however I have not
> observed that. Any ideas?

AUDIT_SIGNAL_INFO is sent when the kernel gets an AUDIT_SIGNAL_INFO
request from auditd.

Basically if you send a signal to the audit daemon, the audit daemon
sends a message to the kernel requesting AUDIT_SIGNAL_INFO.  The kernel
sends the info back to auditd.  Auditd then uses that info to log about
the signal it took.  auditd then acts on the signal it took.

So you wouldn't see it in the normal audit logs.  it's really just a
communication medium between the kernel and auditd.

-Eric

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: AUDIT_SIGNAL_INFO
  2009-03-23 17:59 ` AUDIT_SIGNAL_INFO Eric Paris
@ 2009-03-23 18:01   ` Matthew Booth
  2009-03-23 19:32     ` AUDIT_SIGNAL_INFO Eric Paris
  0 siblings, 1 reply; 5+ messages in thread
From: Matthew Booth @ 2009-03-23 18:01 UTC (permalink / raw)
  To: Eric Paris; +Cc: linux Audit

Eric Paris wrote:
> On Mon, 2009-03-23 at 15:29 +0000, Matthew Booth wrote:
>> Under what circumstances will the RHEL 4 kernel generate a message of
>> type AUDIT_SIGNAL_INFO? My understanding is that it should be sent when
>> a process sends a signal to the audit daemon, however I have not
>> observed that. Any ideas?
> 
> AUDIT_SIGNAL_INFO is sent when the kernel gets an AUDIT_SIGNAL_INFO
> request from auditd.
> 
> Basically if you send a signal to the audit daemon, the audit daemon
> sends a message to the kernel requesting AUDIT_SIGNAL_INFO.  The kernel
> sends the info back to auditd.  Auditd then uses that info to log about
> the signal it took.  auditd then acts on the signal it took.
> 
> So you wouldn't see it in the normal audit logs.  it's really just a
> communication medium between the kernel and auditd.

That makes sense. Looking in libaudit.h, I assume you end up with one of
these:

/* data structure for who signaled the audit daemon */
struct audit_sig_info {
        uid_t           uid;
        pid_t           pid;
    char        ctx[0];
};

Does this give any information in addition to what you'd get from
siginfo_t, or is it inherently more reliable?

Also, is there any way to notice you were sent a KILL or a STOP?

Thanks,

Matt
-- 
Matthew Booth, RHCA, RHCSS
Red Hat, Global Professional Services

M:       +44 (0)7977 267231
GPG ID:  D33C3490
GPG FPR: 3733 612D 2D05 5458 8A8A 1600 3441 EA19 D33C 3490

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: AUDIT_SIGNAL_INFO
  2009-03-23 18:01   ` AUDIT_SIGNAL_INFO Matthew Booth
@ 2009-03-23 19:32     ` Eric Paris
  0 siblings, 0 replies; 5+ messages in thread
From: Eric Paris @ 2009-03-23 19:32 UTC (permalink / raw)
  To: Matthew Booth; +Cc: linux Audit

On Mon, 2009-03-23 at 18:01 +0000, Matthew Booth wrote:
> Eric Paris wrote:
> > On Mon, 2009-03-23 at 15:29 +0000, Matthew Booth wrote:
> >> Under what circumstances will the RHEL 4 kernel generate a message of
> >> type AUDIT_SIGNAL_INFO? My understanding is that it should be sent when
> >> a process sends a signal to the audit daemon, however I have not
> >> observed that. Any ideas?
> > 
> > AUDIT_SIGNAL_INFO is sent when the kernel gets an AUDIT_SIGNAL_INFO
> > request from auditd.
> > 
> > Basically if you send a signal to the audit daemon, the audit daemon
> > sends a message to the kernel requesting AUDIT_SIGNAL_INFO.  The kernel
> > sends the info back to auditd.  Auditd then uses that info to log about
> > the signal it took.  auditd then acts on the signal it took.
> > 
> > So you wouldn't see it in the normal audit logs.  it's really just a
> > communication medium between the kernel and auditd.
> 
> That makes sense. Looking in libaudit.h, I assume you end up with one of
> these:
> 
> /* data structure for who signaled the audit daemon */
> struct audit_sig_info {
>         uid_t           uid;
>         pid_t           pid;
>     char        ctx[0];
> };
> 
> Does this give any information in addition to what you'd get from
> siginfo_t, or is it inherently more reliable?

It's just out of band from the normal audit messages, so auditd can wait
the normal audit queue while it pulls these and figures out how to deal
with them.  If anything it's less reliable, since 2 back to back signals
would actually give you the info about the second signal twice instead
of 2 separate OBJ_PID records.

> Also, is there any way to notice you were sent a KILL or a STOP?

if (sig == SIGTERM || sig == SIGHUP || sig == SIGUSR1 || sig == SIGUSR2)

from AUDIT_SIGNAL_INFO

You could probably get that stuff by watching all kill syscalls and
filtering those based on the OBJ_PID record info I guess.....

-Eric

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2009-03-23 19:32 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-03-23 15:29 AUDIT_SIGNAL_INFO Matthew Booth
2009-03-23 15:43 ` AUDIT_SIGNAL_INFO Steve Grubb
2009-03-23 17:59 ` AUDIT_SIGNAL_INFO Eric Paris
2009-03-23 18:01   ` AUDIT_SIGNAL_INFO Matthew Booth
2009-03-23 19:32     ` AUDIT_SIGNAL_INFO Eric Paris

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox