security_SandboxedServices is flaky: fix or remove |
|
Issue descriptionAs seen in issue 658945 comment 5, security_SandboxedServices appears to be inherently flaky. Even though it can be potentially useful, we can't have knowingly flaky tests in our waterfalls, so it should be fixed. (Maybe use lastcomm?)
,
Dec 5 2016
#1: no known cases of wrong failures, only wrong successes. Ideally these test failures should be caught in the CQ. If the test is flaky in this direction (false positives), the bad CL will go through, and create more work later (build failures, inexperienced sheriffs spending time tracking down the culprits, etc.) Also confuses the picture of build reliability as we have to keep track of good vs. bad flake. Also, this test might not notice security violations for a long time (or ever). I don't think we need to change the kernel in order to run lastcomm. It may be that we just need to add the acct package (to test images) and run accton early at boot. I am OK either way but right now I have to advocate for build/infra/sheriffs.
,
Dec 5 2016
i'm not familiar with lastcomm or how it works. auditing in the kernel doesn't require modifying the kernel, "just" invoking the audit userland to get the info we want.
,
Dec 6 2016
Hi Kees, there are actually security issues on this bug, please let us know if you have any comments.
,
Jun 22 2018
in the meantime, we could have security_SandboxedServices poll the boot state until init scripts have quiesced. perhaps even going as far as waiting for all "tasks" to complete. if we simply wait until boot-complete or system-services have finished, there's a number of jobs that kick off in parallel. for example, crash-boot-collect.conf runs after system-service starts so that it can collect any boot crashes in the background and w/out blocking the UI. then userfeedback/init/firmware-version.conf will run after that process finishes to collect/cache some feedback related logs. |
|
►
Sign in to add a comment |
|
Comment 1 by vapier@chromium.org
, Dec 5 2016