On Thu, 2020-08-06 at 21:59 +0200, Michael Biebl wrote:
> Control: reassign -1 src:linux
> Control: found -1 5.7.10-1
>
> Am 06.08.20 um 21:43 schrieb bauen1:
> > Hi,
> >
> > I've already reported this bug in the kernel audit system upstream,
> > see
> > https://lore.kernel.org/linux-audit/20200
Hi,
I've already reported this bug in the kernel audit system upstream, see
https://lore.kernel.org/linux-audit/20200723200041.7yinlklts47pz...@madcap2.tricolour.ca/T/#t
for details.
A revert (8ac68dc455d9d18241d44b96800d73229029ed34) of the commit that caused
this regression in 5.7 is already
Control: reassign -1 src:linux
Control: found -1 5.7.10-1
Am 06.08.20 um 21:43 schrieb bauen1:
> Hi,
>
> I've already reported this bug in the kernel audit system upstream, see
> https://lore.kernel.org/linux-audit/20200723200041.7yinlklts47pz...@madcap2.tricolour.ca/T/#t
> for details.
>
> A
Le 3/08/20 à 12:46, Laurent Bigonville a écrit :
On Sun, 2 Aug 2020 22:08:56 +0200 Mart van de Wege wrote:
> On Sun, 2 Aug 2020 21:59:05 +0200
> Michael Biebl wrote:
>
> > Am 02.08.20 um 21:41 schrieb Mart van de Wege:
> > > Package: systemd
> > > Version: 245.7-1
> > > Severity: normal
> > >
>
> Before closing the bugs, could you confirm that you are running
> SELinux in permissive mode or not (for what I can see in the
> logs
> it seems to be the case)?
>
Yes, it's running in permissive mode, I'm still working on getting the
policy right.
> On one of my machine at home,
On Sun, 2 Aug 2020 22:08:56 +0200 Mart van de Wege wrote:
> On Sun, 2 Aug 2020 21:59:05 +0200
> Michael Biebl wrote:
>
> > Am 02.08.20 um 21:41 schrieb Mart van de Wege:
> > > Package: systemd
> > > Version: 245.7-1
> > > Severity: normal
> > >
> > > With SELinux enabled (booting with selinux=1
On Sun, 2 Aug 2020 21:59:05 +0200
Michael Biebl wrote:
> Am 02.08.20 um 21:41 schrieb Mart van de Wege:
> > Package: systemd
> > Version: 245.7-1
> > Severity: normal
> >
> > With SELinux enabled (booting with selinux=1 security=selinux), as
> > soon as systemd wants to clean up /run/user/ for a
Am 02.08.20 um 21:41 schrieb Mart van de Wege:
> Package: systemd
> Version: 245.7-1
> Severity: normal
>
> With SELinux enabled (booting with selinux=1 security=selinux), as soon as
> systemd wants
> to clean up /run/user/ for a session, the kernel will oops, leaving the
> systemd-user-runtime
8 matches
Mail list logo