New issue
Advanced search Search tips

Issue 839346 link

Starred by 2 users

Issue metadata

Status: Verified
Owner:
Closed: Jun 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug

Blocked on:
issue 845829



Sign in to add a comment

Chromad: Setting flags in Chrome makes Chrome crash

Project Member Reported by ljusten@chromium.org, May 3 2018

Issue description

Steps To Reproduce:
(1) Provision Chromad device, log in
(2) Set flag on chrome://flags, e.g. night light
(3) Relaunch

Expected Result:
You can log in.

Actual Result:
You can NOT log in. Chrome keeps crashing.

 
Labels: -Pri-3 M-68 Pri-1
Status: Started (was: Assigned)
Project Member

Comment 3 by bugdroid1@chromium.org, May 8 2018

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/15ec04592a2c19b01317036f1a2e0412f0365e53

commit 15ec04592a2c19b01317036f1a2e0412f0365e53
Author: Roman Sorokin <rsorokin@chromium.org>
Date: Tue May 08 16:12:49 2018

Chromad: Handle browser restart for user policy manager.

Active Directory users always need user policy. So setting corresponding
flags in the user policy manager during browser restart.

BUG= chromium:839346 
TEST=manual

Change-Id: I4c1b226c0dbb4d444613bd7784a9d5a7b33cbcaf
Reviewed-on: https://chromium-review.googlesource.com/1046598
Reviewed-by: Drew Wilson <atwilson@chromium.org>
Commit-Queue: Roman Sorokin <rsorokin@chromium.org>
Cr-Commit-Position: refs/heads/master@{#556816}
[modify] https://crrev.com/15ec04592a2c19b01317036f1a2e0412f0365e53/chrome/browser/chromeos/policy/user_policy_manager_factory_chromeos.cc

Thanks Roman!
Status: Fixed (was: Started)
Cc: ibezmenov@chromium.org
Status: Assigned (was: Fixed)
I was able to reproduce this issue in 68.0.3423.0, after setting the flag and relaunch, Chrome keeps crashing.

However in 68.0.3425.0 with this fix I just cannot login:

authpolicy.log

2018-05-10T18:39:04.323932+00:00 INFO authpolicyd[3300]: TGT RENEWAL - Scheduling renewal in 7h 59m 54s (valid for 9h 59m 53s, renewable for 167h 59m 52s)
2018-05-10T18:39:04.323992+00:00 INFO authpolicyd[3300]: #033[42;1;97mAuthenticateUser succeeded#033[0m
2018-05-10T18:39:07.217073+00:00 INFO authpolicyd[3300]: #033[107;1;30mReceived 'GetUserStatus' request#033[0m
2018-05-10T18:39:17.257484+00:00 INFO authpolicyd[3300]: #033[42;1;97mGetUserStatus succeeded#033[0m
2018-05-10T18:39:17.257840+00:00 INFO authpolicyd[3300]: #033[107;1;30mReceived 'GetUserKerberosFiles' request#033[0m
2018-05-10T18:39:17.258034+00:00 INFO authpolicyd[3300]: #033[42;1;97mGetUserKerberosFiles succeeded#033[0m
2018-05-10T18:39:17.259154+00:00 INFO authpolicyd[3300]: #033[107;1;30mReceived 'RefreshUserPolicy' request#033[0m
2018-05-10T18:39:18.841953+00:00 INFO authpolicyd[4137]: libminijail[2]: mount / -> / type ''
2018-05-10T18:39:18.841981+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /dev -> /dev type ''
2018-05-10T18:39:18.841991+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /sys -> /sys type ''
2018-05-10T18:39:18.841999+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /run -> /run type ''
2018-05-10T18:39:18.842008+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /var -> /var type ''
2018-05-10T18:39:18.842016+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /run/authpolicyd -> /run/authpolicyd type ''
2018-05-10T18:39:18.842025+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /var/lib/authpolicyd -> /var/lib/authpolicyd type ''
2018-05-10T18:39:18.842034+00:00 INFO authpolicyd[4137]: libminijail[2]: mount /var/lib/metrics -> /var/lib/metrics type ''
2018-05-10T18:39:18.853712+00:00 INFO authpolicyd[4137]: Install attributes locked to Active Directory mode.
2018-05-10T18:39:18.853735+00:00 INFO authpolicyd[4137]: authpolicyd starting

messages

2018-05-10T18:39:17.224561+00:00 INFO session_manager[1428]: [INFO:session_manager_impl.cc(635)] Stopping all sessions
2018-05-10T18:39:17.227295+00:00 INFO session_manager[1428]: [INFO:browser_job.cc(165)] Terminating process: exiting cleanly
2018-05-10T18:39:17.228424+00:00 INFO session_manager[1428]: [INFO:system_utils_impl.cc(94)] Sending 15 to 3553 as 1000
2018-05-10T18:39:17.304788+00:00 ERR kernel: [  239.663203] iwlwifi 0000:01:00.0: Fail start Tx agg on tid: 0
2018-05-10T18:39:17.594251+00:00 INFO session_manager[1428]: [INFO:session_manager_service.cc(479)] SessionManagerService quitting run loop
2018-05-10T18:39:17.594528+00:00 ERR session_manager[1428]: [ERROR:password_provider.cc(25)] Error finding keyring.: Required key not available
2018-05-10T18:39:17.594586+00:00 ERR session_manager[1428]: [ERROR:password_provider.cc(133)] Error revoking key.: Required key not available
2018-05-10T18:39:17.620637+00:00 INFO session_manager[1428]: [INFO:session_manager_impl.cc(1801)] Android Container with pid 3725 stopped
2018-05-10T18:39:17.624177+00:00 WARNING kernel: [  239.982437] init: arc-kmsg-logger main process (3705) killed by TERM signal
2018-05-10T18:39:17.745395+00:00 INFO session_manager[1428]: [INFO:session_manager_service.cc(200)] SessionManagerService exiting

Please find debug-logs attached.
debug-logs_20180510-114051.tgz
310 KB Download
Status: Fixed (was: Assigned)
Hey, could you please try again? We fixed several issues with login. I just checked on 10703 - setting flags works.
Thanks!
Status: Assigned (was: Fixed)
I wasn't able to login, looks like it keeps crashing while attempting to login as a user.

Chrome: 68.0.3437.0
Chrome OS: 10704.0.0
Device: Robo360

Debug logs attached.
debug-logs_20180522-110558.tgz
291 KB Download
Blockedon: 845829
Thanks for the logs. Seems like a different issue, I filed a bug: https://bugs.chromium.org/p/chromium/issues/detail?id=845829
Status: Fixed (was: Assigned)
Hey Ivan, could you please try again with 10743.0.0+ image? Also could you grab a tcpdump.log during authenticate user? You need to run 'tcpdump -vvv -s 1600 -w tcpdump.log' in a root console before authentication. We're wondering why it is so slow, the log should help to investigate. Thanks!
You might have to install tcpdump and run with the -Z option:

- On a DEV device, open console.
- Enter 'dev_install' to install some dev tools.
- When it asks you to 'Install virtual/target-os-dev package now', enter
'N'.
- Enter 'emerge tcpdump' to install tcpdump.
- Enter 'tcpdump -vvv -i any -s 1600 -w /tmp/tcpdump.log -Z root' to record
network logs.
- Switch away from console, reproduce the authentication issue.
- Go back to console and hit CTRL+C to stop log collection.
- Send us the tcpdump.log file.

- Lutz
Status: Verified (was: Fixed)
I was able to login and set flag on chrome://flags. No issues, marking this as "Verified" (authpolicy.log attached).

I could not install dev tools, looks similar to crbug.com/701955:

Files downloaded, configuring emerge.
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
curl: (22) The requested URL returned error: 403 Forbidden
Emerge installation complete. Installing additional optional packages.
/usr/bin/dev_install: 189: /usr/bin/dev_install: emerge: not found
localhost ~ # 

Chrome OS: 10757.0.0
Chrome: 69.0.3451.0
Device: Santa
authpolicy.log
148 KB View Download

Sign in to add a comment