Hi Auke,

A warning is necessary to prevent silent breakage of the kind I tracked down in 
Fedora ARM. However, the warning could be in the session code (there is only 
silent failure currently). I can look at that if folks prefer.

Separately, I think there should be a set of test_kconfig tests called on boot 
that are updated to look for anything that is later needed in procfs and taint 
somehow.

Jon.

"Kok, Auke-jan H" <auke-jan.h....@intel.com> wrote:

>On Tue, Feb 19, 2013 at 11:29 AM, Jon Masters <jonat...@jonmasters.org>
>wrote:
>> From: Jon Masters <j...@jonmasters.org>
>>
>> Systemd relies upon CONFIG_AUDITSYSCALL support being present in the
>kernel.
>> This is because systemd-logind calls audit_session_from_pid, which
>uses
>> /proc/self/sessionid to determine whether an existing session is
>being
>> replaced as part of e.g. a call to sudo, pkexec, or similar. Without
>> support for system call auditing, these commands will silently fail
>as
>> their session is killed immediately after it is created by systemd.
>>
>> For now, add a check after the existing cgroups test, but in the
>future
>> these functions should all move into a generic check_kconfig function
>> that tests all of the configured kernel options, including these for
>> compliance with the evolving base platform requirements of systemd.
>>
>> Signed-off-by: Jon Masters <j...@jonmasters.org>
>
>Hmmm
>
>The security folks here really dislike CONFIG_AUDIT* as (I understand
>from them) it potentially leaks confidential information... This
>message now comes out rather blunt to those folks who wish to disable
>it... I'm not sure I'll appreciate the console spam from this message.
>
>Is this really necessary?
>
>Auke

-- 
Sent from my phone. Please excuse brevity.
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to