On 12.05.2017 18:26, Carsten Haitzler (The Rasterman) wrote: > On Fri, 12 May 2017 10:58:48 +0200 PaulTT <pau...@gmail.com> said: > >> obviously, i compile it ;) >> packaged ones are full of crap, and even so, i need a couple of patches for >> my setup >> and then, i can also choose when upgrade or not... > > oh interesting. we're 2 for 2 on "4.11 kernel + sudo doesnt work in e and > below" for people who hand compile their own kernels... > > is there an option where the packaged kernels ensure things work? or a patch? > or... > > at least so far in our massive sample size of 2... both compile their own > kernels... :)
That is very interesting indeed. Therefore I asked for people to raise hands that are using (packaged) 4.11 kernels without trouble. Till now I have not yet actually seen this confirmation here. Cheers, Florian >> my 3 ยข ;P >> >> >> On Thu, May 11, 2017 at 2:16 PM, Al Poole <nets...@gmail.com> wrote: >> >>> Are you compiling your own kernels??? >>> >>> If so, maybe you could talk to someone that packages up kernels for ideas? >>> >>> Personally, I wouldn't advise building any kernel from source unless you're >>> testing new features or building one for an embedded system...two pence for >>> you! >>> >>> On Thu, May 11, 2017 at 1:07 PM, Florian Schaefer <list...@netego.de> >>> wrote: >>> >>>> >>>> On 11.05.2017 12:33, Carsten Haitzler (The Rasterman) wrote: >>>>> On Wed, 10 May 2017 09:48:19 +0200 PaulTT <pau...@gmail.com> said: >>>>> >>>>>> i just posted a message about this... (sorry, i've seen now this >>> thread) >>>>>> >>>>>> as i said there, there's also a problem with unlocking (so, pam >>>> related, i >>>>>> assume ?) >>>>>> via console su and sudo worked like a charm (i've got error messages >>>> about >>>>>> cpufreq and backlight too) >>>>> >>>>> pam would be executing a setuid root binary to do the password check... >>>> so it's >>>>> the same issue. something has decided that e and app processes below it >>>> in the >>>>> process tree "cant run setuid (root) binaries" and has disabled that >>>> feature. >>>>> that feature seems to only kick in with 4.11 kernel. it certainly is >>> not >>>> e >>>>> doing this. it has relied on this working for many years. it's >>> something >>>> new >>>>> security-wise that is being enabled by a new kernel. >>>>> >>>>> maybe some parent process is using setpriv? CAP_SETUID disabled? man >>>>> capabilities ... for info ... maybe run captest ? >>>>> e >>>>> 12:20PM ~ > captest >>>>> User credentials uid:1000 euid:1000 suid:1000 >>>>> Group credentials gid:1000 egid:1000 sgid:1000 >>>>> Current capabilities: none >>>>> securebits flags: none >>>>> Attempting direct access to shadow...FAILED (Permission denied) >>>>> Attempting to access shadow by child process...FAILED >>>>> Child User credentials uid:1000 euid:1000 suid:1000 >>>>> Child Group credentials gid:1000 egid:1000 sgid:1000 >>>>> Child capabilities: none >>>>> Child securebits flags: none >>>>> >>>>> is what i get. which is normal. >>>> >>>> I get the same as you on my system here: >>>> >>>> florian@washu:~ # uname -a >>>> Linux washu 4.11.0 #2 SMP PREEMPT Tue May 2 12:12:51 JST 2017 i686 >>>> GNU/Linux >>>> florian@washu:~ # captest >>>> User credentials uid:500 euid:500 suid:500 >>>> Group credentials gid:100 egid:100 sgid:100 >>>> Current capabilities: none >>>> securebits flags: none >>>> Attempting direct access to shadow...FAILED (Permission denied) >>>> Attempting to access shadow by child process...FAILED >>>> Child User credentials uid:500 euid:500 suid:500 >>>> Child Group credentials gid:100 egid:100 sgid:100 >>>> Child capabilities: none >>>> Child securebits flags: none >>>> >>>> Cheers, >>>> Florian >>>> >>>>>> could the problem be related to some new sh**y systemd operation???? >>>>>> i saw that also using wayland, i coulnd't access halt/reboot/suspend >>>> menu >>>>>> items too (this happens to me also with previous kernels) >>>>> >>>>> works for me with enlightenment + wl + arch (+systemd)... i can do all >>>> the >>>>> power off etc. stuff... >>>>> >>>>>> On Thu, May 4, 2017 at 6:19 AM, Carsten Haitzler < >>> ras...@rasterman.com> >>>>>> wrote: >>>>>> >>>>>>> On Thu, 04 May 2017 11:09:13 +0900 <fulwood...@gmail.com> said: >>>>>>> >>>>>>>> Hi, >>>>>>>> >>>>>>>> Carsten Haitzler (The Rasterman) <ras...@rasterman.com> wrote: >>>>>>>> >>>>>>>>> On Wed, 3 May 2017 12:09:21 +0900 Florian Schaefer < >>>> list...@netego.de> >>>>>>> said: >>>>>>>> >>>>>>>>>> Hi! >>>>>>>>>> >>>>>>>>>> On 03.05.2017 10:04, Carsten Haitzler (The Rasterman) wrote: >>>>>>>>>>> On Tue, 02 May 2017 21:16:40 +0900 fulwood...@gmail.com said: >>>>>>>>>>> >>>>>>>>>>>> Hi, >>>>>>>>>>>> >>>>>>>>>>>> I got the source of kernel 4.11, then comipled, and check the >>>>>>>>>>>> behaviour of enlightenment (efl 1.18.1, enlightment 0.21.7). >>>>>>>>>>>> >>>>>>>>>>>> At the start up of enlightenment, I got an error message; >>>>>>>>>>>> >>>>>>>>>>>> There was an error trying to set the cpu power state setting >>> via >>>>>>> the >>>>>>>>>>>> module's setfreq utility. >>>>>>>>>>>> >>>>>>>>>>>> On the kernel 4.10.x, I never see such a message. >>>>>>>>>>>> >>>>>>>>>>>> And, I tried to use su and sudo command in the terminal, I got a >>>>>>>>>>>> strange message; >>>>>>>>>>>> >>>>>>>>>>>> fulwood@linux-uw5l:~> sudo >>>>>>>>>>>> sudo: effective uid is not 0, is sudo installed setuid root >>>>>>>>>>>> >>>>>>>>>>>> fulwood@linux-uw5l:~> su >>>>>>>>>>>> Password: >>>>>>>>>>>> su: incorrect password >>>>>>>>>>>> >>>>>>>>>>>> This means, there is a problem concerning uid treatment in the >>>>>>>>>>>> enlightenment, doesn't it. >>>>>>>>>>>> >>>>>>>>>>>> Moreover, VirtualBox indicate the problem of enlightenment >>>>>>> directly; >>>>>>>>>>>> >>>>>>>>>>>> fulwood@linux-uw51:~> VirtualBox >>>>>>>>>>>> >>>>>>>>>>>> VirtualBox: Error -10 in SUPRHardenedMain! >>>>>>>>>>>> VirtualBox: Effective UID is not root (euid=1000, egid=100, >>>>>>> uid=1000, >>>>>>>>>>>> gid=100) >>>>>>>>>>>> VirtualBox: Tip! It may help to reintall VirtualBox. >>>>>>>>>>>> >>>>>>>>>>>> Why does uid=1000? >>>>>>>>>>> >>>>>>>>>>> that's a common uid to start with for users added to a system - >>>>>>> first >>>>>>>>>>> user added commonly is uid 1000... that's probably ... you. >>>>>>>>>>> >>>>>>>>>>>> So, we can't use enlightenment on the kernel 4.11. >>>>>>>>>>> >>>>>>>>>>> from the above it seems like since you compiled your own kernel >>> it >>>>>>>>>>> seemingly has disabled setuid root binaries. i assume this is >>> some >>>>>>> new >>>>>>>>>>> feature of kernels since 4.11 that has been turned on. i suggest >>>>>>> you >>>>>>>>>>> turn it off to allow them again. your kernel broke far more than >>>>>>>>>>> enlightenment. it broke sudo. probably even broke su. it broke >>>>>>>>>>> virtualbox... it broke stuff. what that option is - i don't know. >>>>>>> this >>>>>>>>>>> is news to me. >>>>>>>>>> >>>>>>>>>> Just for the record I'd like to add that I observe the same >>>> behavior. >>>>>>>>>> >>>>>>>>>> Since switching from 4.9 to 4.11 yesterday I cannot do suid >>>> requiring >>>>>>>>>> operations (like su or mount.cifs) from within E (using >>> terminology >>>>>>> or >>>>>>>>>> xterm) any more. Interestingly, if I am right at the console (so >>> no >>>>>>> Xorg >>>>>>>>>> and e in-between) all those commands work like a charm. >>>>>>>>>> >>>>>>>>>> I could not find any setuid related option in the kernel >>>>>>> configuration >>>>>>>>>> so I cannot really imagine where it is misconfigured. >>>>>>>> >>>>>>>>> it'll likely be some security option that ends up doing this for >>>> child >>>>>>>>> processes ... whatever/however it is... but its certainly a change >>> in >>>>>>> the >>>>>>>>> kernel and "security options" of some sort. >>>>>>>> >>>>>>>> But, why the kernel's change has an impact on enlightenment only? >>>>>>>> On e16 and kde-plasma, no impact. >>>>>>> >>>>>>> neither controls cpu frequency/governor or don't use setuid root >>>> binaries >>>>>>> or >>>>>>> they come from packages with specific selinux rules to allow setuid >>>> root >>>>>>> binaries... or something. but it's a kernel change that creates the >>>> issue. >>>>>>> what >>>>>>> - i don't know. ask your friendly neighbourhood kernel developer. the >>>>>>> setuid >>>>>>> root binaries are specifically erroring out unable to assume root >>> privs >>>>>>> where >>>>>>> they could before. >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> ------------- Codito, ergo sum - "I code, therefore I am" >>>> -------------- >>>>>>> The Rasterman (Carsten Haitzler) ras...@rasterman.com >>>>>>> >>>>>>> >>>>>>> ------------------------------------------------------------ >>>>>>> ------------------ >>>>>>> Check out the vibrant tech community on one of the world's most >>>>>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >>>>>>> _______________________________________________ >>>>>>> enlightenment-devel mailing list >>>>>>> enlightenment-devel@lists.sourceforge.net >>>>>>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel >>>>>>> >>>>>> ------------------------------------------------------------ >>>> ------------------ >>>>>> Check out the vibrant tech community on one of the world's most >>>>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >>>>>> _______________________________________________ >>>>>> enlightenment-devel mailing list >>>>>> enlightenment-devel@lists.sourceforge.net >>>>>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel >>>>>> >>>>> >>>>> >>>> >>>> ------------------------------------------------------------ >>>> ------------------ >>>> Check out the vibrant tech community on one of the world's most >>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >>>> _______________________________________________ >>>> enlightenment-devel mailing list >>>> enlightenment-devel@lists.sourceforge.net >>>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel >>>> >>> ------------------------------------------------------------ >>> ------------------ >>> Check out the vibrant tech community on one of the world's most >>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >>> _______________________________________________ >>> enlightenment-devel mailing list >>> enlightenment-devel@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel >>> >> ------------------------------------------------------------------------------ >> Check out the vibrant tech community on one of the world's most >> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >> _______________________________________________ >> enlightenment-devel mailing list >> enlightenment-devel@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel > > ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ enlightenment-devel mailing list enlightenment-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/enlightenment-devel