cros: SELinux "audit" spam for all Chrome OS process syscalls |
|||||||||||||||||||
Issue description
Chrome Version : 54.0.2840.43
OS Version: 8743.44.0
Platform: elm
What steps will reproduce the problem?
1. Boot
2. Inspect file:///var/log/messages
3.
What is the expected result?
No SELinux spam.
What happens instead of that?
Tons of spam like this:
2016-10-06T23:28:22.475671+08:00 NOTICE kernel: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1
2016-10-06T23:28:22.475690+08:00 NOTICE kernel: [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
2016-10-06T23:28:22.475791+08:00 NOTICE kernel: [ 1.372965] audit: type=1400 audit(1475767701.728:6): avc: denied { read write } for pid=1 comm="init" path="/dev/null" dev="devtmpfs" ino=1028 scontext=u:r:chromeos:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
2016-10-06T23:28:22.475807+08:00 NOTICE kernel: [ 1.373166] audit: type=1400 audit(1475767701.728:7): avc: denied { read } for pid=1 comm="init" name="ld.so.cache" dev="dm-0" ino=65238 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
2016-10-06T23:28:22.475821+08:00 NOTICE kernel: [ 1.373189] audit: type=1400 audit(1475767701.728:8): avc: denied { open } for pid=1 comm="init" path="/etc/ld.so.cache" dev="dm-0" ino=65238 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
2016-10-06T23:28:22.475836+08:00 NOTICE kernel: [ 1.373215] audit: type=1400 audit(1475767701.728:9): avc: denied { getattr } for pid=1 comm="init" path="/etc/ld.so.cache" dev="dm-0" ino=65238 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
2016-10-06T23:28:22.475850+08:00 NOTICE kernel: [ 1.373265] audit: type=1400 audit(1475767701.728:10): avc: denied { read } for pid=1 comm="init" name="libnih.so.1" dev="dm-0" ino=41160 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1
...
2016-10-06T23:28:32.954660+08:00 WARNING kernel: [ 12.522051] audit_printk_skb: 186 callbacks suppressed
2016-10-06T23:28:32.954703+08:00 NOTICE kernel: [ 12.522084] audit: type=1400 audit(1475767712.948:254): avc: denied { write } for pid=2817 comm="Chrome_FileThre" name="ECRYPTFS_FNEK_ENCRYPTED.FXaAmv9LliM9o-Q.qR5YzMAA98qVgO0GHlehIXR2BuGaBIPHHGdiWqHYpI99gIAnMv.b03-Ja6cmV0g-" dev="mmcblk0p1" ino=526656 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1
2016-10-06T23:28:32.954715+08:00 NOTICE kernel: [ 12.522164] audit: type=1400 audit(1475767712.948:255): avc: denied { remove_name } for pid=2817 comm="Chrome_FileThre" name="bm9vbmRpcGhjZGRubmFibWpjaWhjamZiaGZrbG5uZXA=" dev="ecryptfs" ino=531074 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1
2016-10-06T23:28:32.958670+08:00 NOTICE kernel: [ 12.525229] audit: type=1400 audit(1475767712.952:256): avc: denied { rmdir } for pid=2817 comm="Chrome_FileThre" name="ZXh0ZW5zaW9uLXBvbGljeQ==" dev="ecryptfs" ino=526656 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1
2016-10-06T23:28:32.972428+08:00 INFO session_manager[2045]: [INFO:policy_service.cc(196)] Persisted policy to disk.
2016-10-06T23:28:33.148568+08:00 INFO chapsd[1942]: Master key is ready for token at /home/root/a824a8f844db6ede2e36fc40ed202bb091871d04/chaps
2016-10-06T23:28:33.418648+08:00 NOTICE kernel: [ 12.983152] audit: type=1400 audit(1475767713.408:257): avc: denied { lock } for pid=2818 comm="Chrome_FileUser" path=2F686F6D652F6368726F6E6F732F752D613832346138663834346462366564653265333666633430656432303262623039313837316430342F4170706C69636174696F6E2043616368652F496E646578 dev="ecryptfs" ino=660819 scontext=u:r:chromeos:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
These look like they would be useful if they were real denials, however, I think the "permissive=1" means that they are all actually allowed.
So, is there a way to avoid printing these messages that just fill up dmesg?
UserAgentString: Mozilla/5.0 (X11; CrOS aarch64 8743.44.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.43 Safari/537.36
,
Nov 6 2016
This is pretty annoying, and it inspires erroneous bug reports, where people don't notice the "permissive=1", meaning nothing was actually rejected. It also can make feedback report logs less useful. Anybody see a good path to resolving this bug? My suggestions: If (as claimed above) these messages aren't really useful, can't we just disable the prints entirely? Is anybody relying on them? Or if they are useful, can we spin up a user-space daemon to take care of them instead? e.g., auditd [1]? It looks to me like the kernel auditing framework will stop printk()'ing them if it knows someone's listening via netlink [2]. [1] https://linux.die.net/man/8/auditd [2] See code like this: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/chromeos-4.4/kernel/audit.c#529 if (audit_pid) kauditd_send_skb(skb); else audit_printk_skb(skb);
,
Nov 18 2016
Disabling the prints seems sane to me... They are quite annoying.
,
Nov 21 2016
Here's a patch that aborts the 'slow' part of the audit in the permissive=1 case (ie the part that generates the messages that are spamming the log): https://chromium-review.googlesource.com/413144 This shuts up the Chrome OS messages, but doesn't address cernekee's point 2 from #1.
,
Nov 21 2016
@lhchavez - I saw in an email recently that you are now the SELinux policy guru. What do you think of the patch in #4?
,
Nov 21 2016
fwiw, people often use permissive=1 audit messages when developing SELinux policy (by running their app with SELinux in permissive mode then collecting all the denials that would have happened with SELinux enforcing). It might be nice to make this a knob to support that usecase with recompiling the kernel - two options could be having something like a sysctl or it would probably also be fine to enable these logs if SELinux is permissive globally across the system (as opposed to just in one domain).
,
Nov 23 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/1456e8755f19355e2d06430f6f378399b52571aa commit 1456e8755f19355e2d06430f6f378399b52571aa Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Reviewed-on: https://chromium-review.googlesource.com/413144 Commit-Ready: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Reviewed-by: Luis Hector Chavez <lhchavez@google.com> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> [modify] https://crrev.com/1456e8755f19355e2d06430f6f378399b52571aa/security/selinux/avc.c
,
Nov 23 2016
Wait, is the CL from #7 supposed to be a solution to this bug? That does something only when !IS_ENABLED(CONFIG_SECURITY_SELINUX_DEVELOP), but elm (and all other new boards) have USE=android_test, which means CONFIG_SECURITY_SELINUX_DEVELOP is enabled...
,
Nov 23 2016
Correction: I didn't see this: https://chromium-review.googlesource.com/#/c/413167/ Never mind me. (And thanks Dan!)
,
Nov 23 2016
Ooh, but that doesn't quite work for kernel 4.4 at least. b/30375666 never happened for kernel 4.4, so the 'android_test' USE flag still means we accept the default value for SECURITY_SELINUX_DEVELOP, which is =y.
,
Nov 24 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/741fdb68030d96fe8e4b159abd87c1d210e381d5 commit 741fdb68030d96fe8e4b159abd87c1d210e381d5 Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Reviewed-on: https://chromium-review.googlesource.com/413144 Commit-Ready: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Reviewed-by: Luis Hector Chavez <lhchavez@google.com> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> (cherry picked from commit 1456e8755f19355e2d06430f6f378399b52571aa) Reviewed-on: https://chromium-review.googlesource.com/414285 Commit-Ready: Brian Norris <briannorris@chromium.org> Tested-by: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/741fdb68030d96fe8e4b159abd87c1d210e381d5/security/selinux/avc.c
,
Nov 24 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/overlays/chromiumos-overlay/+/7711edc3c7a1d69d0c14c065260b862083723025 commit 7711edc3c7a1d69d0c14c065260b862083723025 Author: Brian Norris <briannorris@chromium.org> Date: Wed Nov 23 19:40:42 2016 cros-kernel2: disable SECURITY_SELINUX_DEVELOP by default USE=android_test is mostly getting merged into the default kernel builds, but kernel 4.4 hasn't caught up yet. In the meantime, we moved SECURITY_SELINUX_DEVELOP=y out into a separate USE=selinux_develop flag. This works for kernels which chose to explicitly disable this in their configs, but we haven't done that yet in 4.4. Let's explicitly disable it in USE=android_test and let USE=selinux_develop still add it back in. BUG= chromium:653575 TEST=emerge-kevin chromeos-kernel-4_4 with and without USE=selinux_develop, check /proc/config.gz Change-Id: I40102aa5311a9485e18abd6598652d10723b2196 Signed-off-by: Brian Norris <briannorris@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/414404 Commit-Ready: Nicolas Boichat <drinkcat@chromium.org> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> Reviewed-by: Mike Frysinger <vapier@chromium.org> [modify] https://crrev.com/7711edc3c7a1d69d0c14c065260b862083723025/eclass/cros-kernel2.eclass
,
Nov 24 2016
,
Nov 24 2016
I guess we should keep this open until all patches are merged to 4.4 (and 3.14)?
,
Nov 25 2016
These patches are also required, were incorrectly labeled (for issue 662450 ), and are requested for merge to 56: https://chromium-review.googlesource.com/412625 https://chromium-review.googlesource.com/413167
,
Nov 25 2016
,
Nov 25 2016
Your change meets the bar and is auto-approved for M56 (branch: 2924)
,
Nov 29 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/80b78a0c55651d9beab6f98cb33a19022efd6c96 commit 80b78a0c55651d9beab6f98cb33a19022efd6c96 Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Previous-Reviewed-on: https://chromium-review.googlesource.com/413144 (cherry picked from commit 8100c29529c3cb8ec8b4a43a28874c8f301b5a27) Reviewed-on: https://chromium-review.googlesource.com/414677 Trybot-Ready: Daniel Kurtz <djkurtz@chromium.org> Commit-Queue: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Reviewed-by: Daniel Kurtz <djkurtz@chromium.org> [modify] https://crrev.com/80b78a0c55651d9beab6f98cb33a19022efd6c96/security/selinux/avc.c
,
Nov 29 2016
I ported to chromeos-3.14, and verified on samus: I cherry-picked the eclass change to R56: https://chromium-review.googlesource.com/#/c/414714/ I cherry-picked the 3.18 patches to R56 (release-R56-9000.B-chromeos-3.18): https://chromium-review.googlesource.com/414772 https://chromium-review.googlesource.com/414677 I cherry-picked the 3.14 patches to R56 (release-R56-9000.B-chromeos-3.14): https://chromium-review.googlesource.com/415008 https://chromium-review.googlesource.com/414833 Brian, can you cherry-pick to R56 any patches that are needed for 4.4?
,
Nov 29 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/9df9639fd8581d82694d3dbdc6ba8ef767c09102 commit 9df9639fd8581d82694d3dbdc6ba8ef767c09102 Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Reviewed-on: https://chromium-review.googlesource.com/413144 Commit-Ready: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Reviewed-by: Luis Hector Chavez <lhchavez@google.com> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> (cherry picked from commit 1456e8755f19355e2d06430f6f378399b52571aa) Reviewed-on: https://chromium-review.googlesource.com/415124 Reviewed-by: Daniel Kurtz <djkurtz@chromium.org> [modify] https://crrev.com/9df9639fd8581d82694d3dbdc6ba8ef767c09102/security/selinux/avc.c
,
Nov 29 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/8bf6d9dbf55c73aca2f8073a46397bb502b37e47 commit 8bf6d9dbf55c73aca2f8073a46397bb502b37e47 Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Reviewed-on: https://chromium-review.googlesource.com/413144 Commit-Ready: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Reviewed-by: Luis Hector Chavez <lhchavez@google.com> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> (cherry picked from commit 1456e8755f19355e2d06430f6f378399b52571aa) Reviewed-on: https://chromium-review.googlesource.com/414285 Commit-Ready: Brian Norris <briannorris@chromium.org> Tested-by: Brian Norris <briannorris@chromium.org> (cherry picked from commit 741fdb68030d96fe8e4b159abd87c1d210e381d5) Reviewed-on: https://chromium-review.googlesource.com/415028 Reviewed-by: Brian Norris <briannorris@chromium.org> Commit-Queue: Brian Norris <briannorris@chromium.org> [modify] https://crrev.com/8bf6d9dbf55c73aca2f8073a46397bb502b37e47/security/selinux/avc.c
,
Nov 29 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/overlays/chromiumos-overlay/+/05deaf023e440452397d17117eb21789687ddc34 commit 05deaf023e440452397d17117eb21789687ddc34 Author: Brian Norris <briannorris@chromium.org> Date: Wed Nov 23 19:40:42 2016 cros-kernel2: disable SECURITY_SELINUX_DEVELOP by default USE=android_test is mostly getting merged into the default kernel builds, but kernel 4.4 hasn't caught up yet. In the meantime, we moved SECURITY_SELINUX_DEVELOP=y out into a separate USE=selinux_develop flag. This works for kernels which chose to explicitly disable this in their configs, but we haven't done that yet in 4.4. Let's explicitly disable it in USE=android_test and let USE=selinux_develop still add it back in. BUG= chromium:653575 TEST=emerge-kevin chromeos-kernel-4_4 with and without USE=selinux_develop, check /proc/config.gz Change-Id: I40102aa5311a9485e18abd6598652d10723b2196 Signed-off-by: Brian Norris <briannorris@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/414404 Commit-Ready: Nicolas Boichat <drinkcat@chromium.org> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> Reviewed-by: Mike Frysinger <vapier@chromium.org> (cherry picked from commit 7711edc3c7a1d69d0c14c065260b862083723025) Reviewed-on: https://chromium-review.googlesource.com/414251 [modify] https://crrev.com/05deaf023e440452397d17117eb21789687ddc34/eclass/cros-kernel2.eclass
,
Nov 29 2016
OK, it looks like 3.18 and 4.4 are ready on R56. Daniel, you haven't landed the changes in #19 for kernel 3.14 on R56. Were you still intending to?
,
Nov 30 2016
@briannorris - yes, but I wanted to wait for them to land on ToT first, which they now have.
,
Nov 30 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/f7a4d1d43efc2f767002307b4e892220ac4c36aa commit f7a4d1d43efc2f767002307b4e892220ac4c36aa Author: Daniel Kurtz <djkurtz@chromium.org> Date: Mon Nov 21 04:06:29 2016 CHROMIUM: selinux: Do not log "permissive" denials If an access triggers an denial, but it was allowed due to a global or per-domain permissive mode, (ie the message would have a "permissive=1" field), don't even bother going through the slow audit path to print the message. The permissive=1 messages spam the kernel logs making it much harder to see other useful messages. On elm, each slow_avc_audit() call consumes ~10-60 us. Signed-off-by: Daniel Kurtz <djkurtz@chromium.org> BUG= chromium:653575 TEST=Boot, inspect /var/log/messages, no more messages like: [ 1.372604] audit: type=1400 audit(1475767701.728:4): avc: denied { read } for pid=1 comm="init" name="ld-linux-armhf.so.3" dev="dm-0" ino=40094 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=lnk_file permissive=1 [ 1.372640] audit: type=1400 audit(1475767701.728:5): avc: denied { execute } for pid=1 comm="init" name="ld-2.19.so" dev="dm-0" ino=40084 scontext=u:r:kernel:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1 Change-Id: Ic5b0630299f6bcac53659771b6c0cfef9cc13e2e Previous-Reviewed-on: https://chromium-review.googlesource.com/413144 (cherry picked from commit 1456e8755f19355e2d06430f6f378399b52571aa) Previous-Reviewed-on: https://chromium-review.googlesource.com/415124 (cherry picked from commit 8114788258362509b7a9481de5c1aa71145a1680) Reviewed-on: https://chromium-review.googlesource.com/414833 Reviewed-by: Daniel Kurtz <djkurtz@chromium.org> Commit-Queue: Daniel Kurtz <djkurtz@chromium.org> Tested-by: Daniel Kurtz <djkurtz@chromium.org> Trybot-Ready: Daniel Kurtz <djkurtz@chromium.org> [modify] https://crrev.com/f7a4d1d43efc2f767002307b4e892220ac4c36aa/security/selinux/avc.c
,
Nov 30 2016
,
Dec 1 2016
Bulk-Verify
,
Jan 17 2017
|
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by cernekee@chromium.org
, Oct 6 2016