on one of failed logins, auth.log says this:

May  9 19:02:35 cadbane unix_chkpwd[3773]: check pass; user unknown
May  9 19:02:35 cadbane unix_chkpwd[3773]: password check failed for user
(ptt)
May  9 19:02:35 cadbane enlightenment: pam_unix(login:auth): authentication
failure; logname= uid=1000 euid=1000 tty= ruser= rhost=localhost  user=ptt

unfortunately i really can't reboot the machine now...

could it be something related to libinput versus evdev driver in X (or wl)?



On Fri, May 12, 2017 at 10:58 AM, PaulTT <[email protected]> wrote:

> obviously, i compile it ;)
> packaged ones are full of crap, and even so, i need a couple of patches
> for my setup
> and then, i can also choose when upgrade or not...
>
> my 3 ยข ;P
>
>
> On Thu, May 11, 2017 at 2:16 PM, Al Poole <[email protected]> wrote:
>
>> Are you compiling your own kernels???
>>
>> If so, maybe you could talk to someone that packages up kernels for ideas?
>>
>> Personally, I wouldn't advise building any kernel from source unless
>> you're
>> testing new features or building one for an embedded system...two pence
>> for
>> you!
>>
>> On Thu, May 11, 2017 at 1:07 PM, Florian Schaefer <[email protected]>
>> wrote:
>>
>> >
>> > On 11.05.2017 12:33, Carsten Haitzler (The Rasterman) wrote:
>> > > On Wed, 10 May 2017 09:48:19 +0200 PaulTT <[email protected]> said:
>> > >
>> > >> i just posted a message about this... (sorry, i've seen now this
>> thread)
>> > >>
>> > >> as i said there, there's also a problem with unlocking (so, pam
>> > related, i
>> > >> assume ?)
>> > >> via console su and sudo worked like a charm (i've got error messages
>> > about
>> > >> cpufreq and backlight too)
>> > >
>> > > pam would be executing a setuid root binary to do the password
>> check...
>> > so it's
>> > > the same issue. something has decided that e and app processes below
>> it
>> > in the
>> > > process tree "cant run setuid (root) binaries" and has disabled that
>> > feature.
>> > > that feature seems to only kick in with 4.11 kernel. it certainly is
>> not
>> > e
>> > > doing this. it has relied on this working for many years. it's
>> something
>> > new
>> > > security-wise that is being enabled by a new kernel.
>> > >
>> > > maybe some parent process is using setpriv? CAP_SETUID  disabled? man
>> > > capabilities ... for info ... maybe run captest ?
>> > >e
>> > > 12:20PM ~ > captest
>> > > User  credentials uid:1000 euid:1000 suid:1000
>> > > Group credentials gid:1000 egid:1000 sgid:1000
>> > > Current capabilities: none
>> > > securebits flags: none
>> > > Attempting direct access to shadow...FAILED (Permission denied)
>> > > Attempting to access shadow by child process...FAILED
>> > > Child User  credentials uid:1000 euid:1000 suid:1000
>> > > Child Group credentials gid:1000 egid:1000 sgid:1000
>> > > Child capabilities: none
>> > > Child securebits flags: none
>> > >
>> > > is what i get. which is normal.
>> >
>> > I get the same as you on my system here:
>> >
>> > florian@washu:~ # uname -a
>> > Linux washu 4.11.0 #2 SMP PREEMPT Tue May 2 12:12:51 JST 2017 i686
>> > GNU/Linux
>> > florian@washu:~ # captest
>> > User  credentials uid:500 euid:500 suid:500
>> > Group credentials gid:100 egid:100 sgid:100
>> > Current capabilities: none
>> > securebits flags: none
>> > Attempting direct access to shadow...FAILED (Permission denied)
>> > Attempting to access shadow by child process...FAILED
>> > Child User  credentials uid:500 euid:500 suid:500
>> > Child Group credentials gid:100 egid:100 sgid:100
>> > Child capabilities: none
>> > Child securebits flags: none
>> >
>> > Cheers,
>> > Florian
>> >
>> > >> could the problem be related to some new sh**y systemd operation????
>> > >> i saw that also using wayland, i coulnd't access halt/reboot/suspend
>> > menu
>> > >> items too (this happens to me also with previous kernels)
>> > >
>> > > works for me with enlightenment + wl + arch (+systemd)... i can do all
>> > the
>> > > power off etc. stuff...
>> > >
>> > >> On Thu, May 4, 2017 at 6:19 AM, Carsten Haitzler <
>> [email protected]>
>> > >> wrote:
>> > >>
>> > >>> On Thu, 04 May 2017 11:09:13 +0900 <[email protected]> said:
>> > >>>
>> > >>>> Hi,
>> > >>>>
>> > >>>> Carsten Haitzler (The Rasterman) <[email protected]> wrote:
>> > >>>>
>> > >>>>> On Wed, 3 May 2017 12:09:21 +0900 Florian Schaefer <
>> > [email protected]>
>> > >>> said:
>> > >>>>
>> > >>>>>> Hi!
>> > >>>>>>
>> > >>>>>> On 03.05.2017 10:04, Carsten Haitzler (The Rasterman) wrote:
>> > >>>>>>> On Tue, 02 May 2017 21:16:40 +0900 [email protected] said:
>> > >>>>>>>
>> > >>>>>>>> Hi,
>> > >>>>>>>>
>> > >>>>>>>> I got the source of kernel 4.11, then comipled, and check the
>> > >>>>>>>> behaviour of enlightenment (efl 1.18.1, enlightment 0.21.7).
>> > >>>>>>>>
>> > >>>>>>>> At the start up of enlightenment, I got an error message;
>> > >>>>>>>>
>> > >>>>>>>>  There was an error trying to set the cpu power state setting
>> via
>> > >>> the
>> > >>>>>>>>  module's setfreq utility.
>> > >>>>>>>>
>> > >>>>>>>> On the kernel 4.10.x, I never see such a message.
>> > >>>>>>>>
>> > >>>>>>>> And, I tried to use su and sudo command in the terminal, I got
>> a
>> > >>>>>>>> strange message;
>> > >>>>>>>>
>> > >>>>>>>> fulwood@linux-uw5l:~> sudo
>> > >>>>>>>> sudo: effective uid is not 0, is sudo installed setuid root
>> > >>>>>>>>
>> > >>>>>>>> fulwood@linux-uw5l:~> su
>> > >>>>>>>> Password:
>> > >>>>>>>> su: incorrect password
>> > >>>>>>>>
>> > >>>>>>>> This means, there is a problem concerning uid treatment in the
>> > >>>>>>>> enlightenment, doesn't it.
>> > >>>>>>>>
>> > >>>>>>>> Moreover, VirtualBox indicate the problem of enlightenment
>> > >>> directly;
>> > >>>>>>>>
>> > >>>>>>>> fulwood@linux-uw51:~> VirtualBox
>> > >>>>>>>>
>> > >>>>>>>> VirtualBox: Error -10 in SUPRHardenedMain!
>> > >>>>>>>> VirtualBox: Effective UID is not root (euid=1000, egid=100,
>> > >>> uid=1000,
>> > >>>>>>>>             gid=100)
>> > >>>>>>>> VirtualBox: Tip! It may help to reintall VirtualBox.
>> > >>>>>>>>
>> > >>>>>>>> Why does uid=1000?
>> > >>>>>>>
>> > >>>>>>> that's a common uid to start with for users added to a system -
>> > >>> first
>> > >>>>>>> user added commonly is uid 1000... that's probably ... you.
>> > >>>>>>>
>> > >>>>>>>> So, we can't use enlightenment on the kernel 4.11.
>> > >>>>>>>
>> > >>>>>>> from the above it seems like since you compiled your own kernel
>> it
>> > >>>>>>> seemingly has disabled setuid root binaries. i assume this is
>> some
>> > >>> new
>> > >>>>>>> feature of kernels since 4.11 that has been turned on. i suggest
>> > >>> you
>> > >>>>>>> turn it off to allow them again. your kernel broke far more than
>> > >>>>>>> enlightenment. it broke sudo. probably even broke su. it broke
>> > >>>>>>> virtualbox... it broke stuff. what that option is - i don't
>> know.
>> > >>> this
>> > >>>>>>> is news to me.
>> > >>>>>>
>> > >>>>>> Just for the record I'd like to add that I observe the same
>> > behavior.
>> > >>>>>>
>> > >>>>>> Since switching from 4.9 to 4.11 yesterday I cannot do suid
>> > requiring
>> > >>>>>> operations (like su or mount.cifs) from within E (using
>> terminology
>> > >>> or
>> > >>>>>> xterm) any more. Interestingly, if I am right at the console (so
>> no
>> > >>> Xorg
>> > >>>>>> and e in-between) all those commands work like a charm.
>> > >>>>>>
>> > >>>>>> I could not find any setuid related option in the kernel
>> > >>> configuration
>> > >>>>>> so I cannot really imagine where it is misconfigured.
>> > >>>>
>> > >>>>> it'll likely be some security option that ends up doing this for
>> > child
>> > >>>>> processes ... whatever/however it is... but its certainly a
>> change in
>> > >>> the
>> > >>>>> kernel and "security options" of some sort.
>> > >>>>
>> > >>>> But, why the kernel's change has an impact on enlightenment only?
>> > >>>> On e16 and kde-plasma, no impact.
>> > >>>
>> > >>> neither controls cpu frequency/governor or don't use setuid root
>> > binaries
>> > >>> or
>> > >>> they come from packages with specific selinux rules to allow setuid
>> > root
>> > >>> binaries... or something. but it's a kernel change that creates the
>> > issue.
>> > >>> what
>> > >>> - i don't know. ask your friendly neighbourhood kernel developer.
>> the
>> > >>> setuid
>> > >>> root binaries are specifically erroring out unable to assume root
>> privs
>> > >>> where
>> > >>> they could before.
>> > >>>
>> > >>>
>> > >>> --
>> > >>> ------------- Codito, ergo sum - "I code, therefore I am"
>> > --------------
>> > >>> The Rasterman (Carsten Haitzler)    [email protected]
>> > >>>
>> > >>>
>> > >>> ------------------------------------------------------------
>> > >>> ------------------
>> > >>> Check out the vibrant tech community on one of the world's most
>> > >>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>> > >>> _______________________________________________
>> > >>> enlightenment-devel mailing list
>> > >>> [email protected]
>> > >>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel
>> > >>>
>> > >> ------------------------------------------------------------
>> > ------------------
>> > >> Check out the vibrant tech community on one of the world's most
>> > >> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>> > >> _______________________________________________
>> > >> enlightenment-devel mailing list
>> > >> [email protected]
>> > >> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel
>> > >>
>> > >
>> > >
>> >
>> > ------------------------------------------------------------
>> > ------------------
>> > Check out the vibrant tech community on one of the world's most
>> > engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>> > _______________________________________________
>> > enlightenment-devel mailing list
>> > [email protected]
>> > https://lists.sourceforge.net/lists/listinfo/enlightenment-devel
>> >
>> ------------------------------------------------------------
>> ------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>> _______________________________________________
>> enlightenment-devel mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/enlightenment-devel
>>
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
enlightenment-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to