| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
Before this patch the only way to prevent journald from reading the audit
messages was to mask systemd-journald-audit.socket. However this had main
drawback that downstream couldn't ship the socket disabled by default (beside
the fact that masking units is not supposed to be the usual way to disable
them).
Fixes #15777
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
socket" (#6513)
* Revert "modprobe.d: ship drop-in to set bonding max_bonds to 0 (#6448)"
This reverts commit 582faeb461aa0dd01b55bf6c9b1433532fc927d3.
* Revert "units: set ConditionVirtualization=!private-users on journald audit socket (#6508)"
This reverts commit d2a1ba103b4ea22764953d795c36db3d492d50c9.
|
|
|
|
|
| |
(#6508)
It fails to start in an unprivileged container as audit is not namespace aware.
|
|
|
|
|
| |
The multicast logic can only work if the capability is available, hence
require it.
|
|
|
|
| |
And conditionalize journald audit support with it
|
|
|