obviously, i compile it ;) packaged ones are full of crap, and even so, i need a couple of patches for my setup and then, i can also choose when upgrade or not...
my 3 ยข ;P On Thu, May 11, 2017 at 2:16 PM, Al Poole <[email protected]> wrote: > Are you compiling your own kernels??? > > If so, maybe you could talk to someone that packages up kernels for ideas? > > Personally, I wouldn't advise building any kernel from source unless you're > testing new features or building one for an embedded system...two pence for > you! > > On Thu, May 11, 2017 at 1:07 PM, Florian Schaefer <[email protected]> > wrote: > > > > > On 11.05.2017 12:33, Carsten Haitzler (The Rasterman) wrote: > > > On Wed, 10 May 2017 09:48:19 +0200 PaulTT <[email protected]> said: > > > > > >> i just posted a message about this... (sorry, i've seen now this > thread) > > >> > > >> as i said there, there's also a problem with unlocking (so, pam > > related, i > > >> assume ?) > > >> via console su and sudo worked like a charm (i've got error messages > > about > > >> cpufreq and backlight too) > > > > > > pam would be executing a setuid root binary to do the password check... > > so it's > > > the same issue. something has decided that e and app processes below it > > in the > > > process tree "cant run setuid (root) binaries" and has disabled that > > feature. > > > that feature seems to only kick in with 4.11 kernel. it certainly is > not > > e > > > doing this. it has relied on this working for many years. it's > something > > new > > > security-wise that is being enabled by a new kernel. > > > > > > maybe some parent process is using setpriv? CAP_SETUID disabled? man > > > capabilities ... for info ... maybe run captest ? > > >e > > > 12:20PM ~ > captest > > > User credentials uid:1000 euid:1000 suid:1000 > > > Group credentials gid:1000 egid:1000 sgid:1000 > > > Current capabilities: none > > > securebits flags: none > > > Attempting direct access to shadow...FAILED (Permission denied) > > > Attempting to access shadow by child process...FAILED > > > Child User credentials uid:1000 euid:1000 suid:1000 > > > Child Group credentials gid:1000 egid:1000 sgid:1000 > > > Child capabilities: none > > > Child securebits flags: none > > > > > > is what i get. which is normal. > > > > I get the same as you on my system here: > > > > florian@washu:~ # uname -a > > Linux washu 4.11.0 #2 SMP PREEMPT Tue May 2 12:12:51 JST 2017 i686 > > GNU/Linux > > florian@washu:~ # captest > > User credentials uid:500 euid:500 suid:500 > > Group credentials gid:100 egid:100 sgid:100 > > Current capabilities: none > > securebits flags: none > > Attempting direct access to shadow...FAILED (Permission denied) > > Attempting to access shadow by child process...FAILED > > Child User credentials uid:500 euid:500 suid:500 > > Child Group credentials gid:100 egid:100 sgid:100 > > Child capabilities: none > > Child securebits flags: none > > > > Cheers, > > Florian > > > > >> could the problem be related to some new sh**y systemd operation???? > > >> i saw that also using wayland, i coulnd't access halt/reboot/suspend > > menu > > >> items too (this happens to me also with previous kernels) > > > > > > works for me with enlightenment + wl + arch (+systemd)... i can do all > > the > > > power off etc. stuff... > > > > > >> On Thu, May 4, 2017 at 6:19 AM, Carsten Haitzler < > [email protected]> > > >> wrote: > > >> > > >>> On Thu, 04 May 2017 11:09:13 +0900 <[email protected]> said: > > >>> > > >>>> Hi, > > >>>> > > >>>> Carsten Haitzler (The Rasterman) <[email protected]> wrote: > > >>>> > > >>>>> On Wed, 3 May 2017 12:09:21 +0900 Florian Schaefer < > > [email protected]> > > >>> said: > > >>>> > > >>>>>> Hi! > > >>>>>> > > >>>>>> On 03.05.2017 10:04, Carsten Haitzler (The Rasterman) wrote: > > >>>>>>> On Tue, 02 May 2017 21:16:40 +0900 [email protected] said: > > >>>>>>> > > >>>>>>>> Hi, > > >>>>>>>> > > >>>>>>>> I got the source of kernel 4.11, then comipled, and check the > > >>>>>>>> behaviour of enlightenment (efl 1.18.1, enlightment 0.21.7). > > >>>>>>>> > > >>>>>>>> At the start up of enlightenment, I got an error message; > > >>>>>>>> > > >>>>>>>> There was an error trying to set the cpu power state setting > via > > >>> the > > >>>>>>>> module's setfreq utility. > > >>>>>>>> > > >>>>>>>> On the kernel 4.10.x, I never see such a message. > > >>>>>>>> > > >>>>>>>> And, I tried to use su and sudo command in the terminal, I got a > > >>>>>>>> strange message; > > >>>>>>>> > > >>>>>>>> fulwood@linux-uw5l:~> sudo > > >>>>>>>> sudo: effective uid is not 0, is sudo installed setuid root > > >>>>>>>> > > >>>>>>>> fulwood@linux-uw5l:~> su > > >>>>>>>> Password: > > >>>>>>>> su: incorrect password > > >>>>>>>> > > >>>>>>>> This means, there is a problem concerning uid treatment in the > > >>>>>>>> enlightenment, doesn't it. > > >>>>>>>> > > >>>>>>>> Moreover, VirtualBox indicate the problem of enlightenment > > >>> directly; > > >>>>>>>> > > >>>>>>>> fulwood@linux-uw51:~> VirtualBox > > >>>>>>>> > > >>>>>>>> VirtualBox: Error -10 in SUPRHardenedMain! > > >>>>>>>> VirtualBox: Effective UID is not root (euid=1000, egid=100, > > >>> uid=1000, > > >>>>>>>> gid=100) > > >>>>>>>> VirtualBox: Tip! It may help to reintall VirtualBox. > > >>>>>>>> > > >>>>>>>> Why does uid=1000? > > >>>>>>> > > >>>>>>> that's a common uid to start with for users added to a system - > > >>> first > > >>>>>>> user added commonly is uid 1000... that's probably ... you. > > >>>>>>> > > >>>>>>>> So, we can't use enlightenment on the kernel 4.11. > > >>>>>>> > > >>>>>>> from the above it seems like since you compiled your own kernel > it > > >>>>>>> seemingly has disabled setuid root binaries. i assume this is > some > > >>> new > > >>>>>>> feature of kernels since 4.11 that has been turned on. i suggest > > >>> you > > >>>>>>> turn it off to allow them again. your kernel broke far more than > > >>>>>>> enlightenment. it broke sudo. probably even broke su. it broke > > >>>>>>> virtualbox... it broke stuff. what that option is - i don't know. > > >>> this > > >>>>>>> is news to me. > > >>>>>> > > >>>>>> Just for the record I'd like to add that I observe the same > > behavior. > > >>>>>> > > >>>>>> Since switching from 4.9 to 4.11 yesterday I cannot do suid > > requiring > > >>>>>> operations (like su or mount.cifs) from within E (using > terminology > > >>> or > > >>>>>> xterm) any more. Interestingly, if I am right at the console (so > no > > >>> Xorg > > >>>>>> and e in-between) all those commands work like a charm. > > >>>>>> > > >>>>>> I could not find any setuid related option in the kernel > > >>> configuration > > >>>>>> so I cannot really imagine where it is misconfigured. > > >>>> > > >>>>> it'll likely be some security option that ends up doing this for > > child > > >>>>> processes ... whatever/however it is... but its certainly a change > in > > >>> the > > >>>>> kernel and "security options" of some sort. > > >>>> > > >>>> But, why the kernel's change has an impact on enlightenment only? > > >>>> On e16 and kde-plasma, no impact. > > >>> > > >>> neither controls cpu frequency/governor or don't use setuid root > > binaries > > >>> or > > >>> they come from packages with specific selinux rules to allow setuid > > root > > >>> binaries... or something. but it's a kernel change that creates the > > issue. > > >>> what > > >>> - i don't know. ask your friendly neighbourhood kernel developer. the > > >>> setuid > > >>> root binaries are specifically erroring out unable to assume root > privs > > >>> where > > >>> they could before. > > >>> > > >>> > > >>> -- > > >>> ------------- Codito, ergo sum - "I code, therefore I am" > > -------------- > > >>> The Rasterman (Carsten Haitzler) [email protected] > > >>> > > >>> > > >>> ------------------------------------------------------------ > > >>> ------------------ > > >>> Check out the vibrant tech community on one of the world's most > > >>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > >>> _______________________________________________ > > >>> enlightenment-devel mailing list > > >>> [email protected] > > >>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel > > >>> > > >> ------------------------------------------------------------ > > ------------------ > > >> Check out the vibrant tech community on one of the world's most > > >> engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > >> _______________________________________________ > > >> enlightenment-devel mailing list > > >> [email protected] > > >> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel > > >> > > > > > > > > > > ------------------------------------------------------------ > > ------------------ > > Check out the vibrant tech community on one of the world's most > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > _______________________________________________ > > enlightenment-devel mailing list > > [email protected] > > https://lists.sourceforge.net/lists/listinfo/enlightenment-devel > > > ------------------------------------------------------------ > ------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > enlightenment-devel mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/enlightenment-devel > ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ enlightenment-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/enlightenment-devel
