mirror of
https://abf.rosa.ru/djam/kernel-6.7-xanmod.git
synced 2025-02-24 17:42:49 +00:00

Earlier, the patches were kept in the respective branches of a separate project, https://abf.io/soft/kernel-patches-and-configs. And before that - in the custom tarballs. Now all the patches are kept here along with the spec file and are applied the default way rather than by separate scripts. This should make the maintenance of the patches as well as the experiments with the new ones a lot easier. The previous scheme seemed to offer a bit more flexibility (different patch sets for different cases) at the cost of maintenance. But as it turned out, that flexibility was not worth it and was rarely used, at most.
22 lines
749 B
Diff
22 lines
749 B
Diff
It seems, if audit itself is not installed and therefore nothing listens
|
|
to the messages from the kernel's audit subsystem, the latter spams the
|
|
kernel log with such messages.
|
|
|
|
Let us make them debug-level and thus invisible by default.
|
|
|
|
http://bugs.rosalinux.ru/show_bug.cgi?id=6235
|
|
http://bugs.rosalinux.ru/show_bug.cgi?id=6459
|
|
|
|
diff --git a/kernel/audit.c b/kernel/audit.c
|
|
index 1c13e42..56270ce 100644
|
|
--- a/kernel/audit.c
|
|
+++ b/kernel/audit.c
|
|
@@ -396,7 +396,7 @@ static void audit_printk_skb(struct sk_buff *skb)
|
|
|
|
if (nlh->nlmsg_type != AUDIT_EOE) {
|
|
if (printk_ratelimit())
|
|
- pr_notice("type=%d %s\n", nlh->nlmsg_type, data);
|
|
+ pr_debug("type=%d %s\n", nlh->nlmsg_type, data);
|
|
else
|
|
audit_log_lost("printk limit exceeded");
|
|
}
|