selinux is blocking things outside of the ARC++ container |
||
Issue description
this no longer works after recent selinux changes:
# mkdir /foo
mkdir: cannot create directory '/foo': Permission denied
# dmesg -c | tail -1
[610750.874961] audit: type=1400 audit(1534442164.718:143): avc: denied { associate } for pid=13038 comm="mkdir" name="foo" scontext=u:object_r:rootfs:s0 tcontext=u:object_r:labeledfs:s0 tclass=filesystem permissive=0
rolling out selinux updates have been fine as long as they only applied to ARC++ or were in permissive mode outside of the ARC++ container. however, we cannot deploy anything restrictive as long as (1) no one in the wider CrOS team has been made aware of this and (2) there is zero documentation on selinux+CrOS.
,
Sep 20
s/documents/documentation/
,
Sep 20
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/platform2/+/dd82cdb1ca9b8bbb97397a919567a227c406bce4 commit dd82cdb1ca9b8bbb97397a919567a227c406bce4 Author: Qijiang Fan <fqj@chromium.org> Date: Thu Sep 20 18:39:48 2018 sepolicy: temporarily allow rootfs to associate to labeledfs. BUG= chromium:874980 TEST=mkdir /foo on betty (ARC N boards) Change-Id: I9015b0c11bfefd00b309ceab920eadd9c519febd Reviewed-on: https://chromium-review.googlesource.com/1235434 Commit-Ready: Qijiang Fan <fqj@google.com> Tested-by: Qijiang Fan <fqj@google.com> Reviewed-by: Kenny Root <kroot@google.com> [modify] https://crrev.com/dd82cdb1ca9b8bbb97397a919567a227c406bce4/sepolicy/policy/chromeos/file.te
,
Sep 20
when we have documentation/tooling in place and have made developers aware, i think we're happy with rolling out selinux to CrOS more widely to make the default behavior more restrictive
,
Sep 21
we've got another report of /boot being blocked: https://groups.google.com/a/chromium.org/d/topic/chromium-os-dev/aAFOZeDzRkA/discussion this breaks people trying to use update_kernel.sh when developing.
,
Sep 26
/boot should be the same reason. It should now be fixed. |
||
►
Sign in to add a comment |
||
Comment 1 by f...@chromium.org
, Sep 20