From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752076AbcDJCl4 (ORCPT ); Sat, 9 Apr 2016 22:41:56 -0400 Received: from one.firstfloor.org ([193.170.194.197]:32795 "EHLO one.firstfloor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751214AbcDJCl4 (ORCPT ); Sat, 9 Apr 2016 22:41:56 -0400 Date: Sat, 9 Apr 2016 19:41:53 -0700 From: Andi Kleen To: Paul Moore Cc: Andi Kleen , Eric Paris , linux-kernel@vger.kernel.org, Andi Kleen Subject: Re: [PATCH] Don't audit SECCOMP_KILL/RET_ERRNO when syscall auditing is disabled Message-ID: <20160410024152.GG9407@two.firstfloor.org> References: <1460214451-5435-1-git-send-email-andi@firstfloor.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > What kernel version are you using? I believe we fixed that in Linux > 4.5 with the following: This is 4.6-rc2. > > commit 96368701e1c89057bbf39222e965161c68a85b4b > From: Paul Moore > Date: Wed, 13 Jan 2016 10:18:55 -0400 (09:18 -0500) > > audit: force seccomp event logging to honor the audit_enabled flag No you didn't fix it because audit_enabled is always enabled by systemd for user space auditing, see the original description of my patch. -Andi