New issue
Advanced search Search tips

Issue 891153 link

Starred by 5 users

Issue metadata

Status: Verified
Owner:
Closed: Oct 5
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

crostini ssh port forwarding crash

Project Member Reported by smbar...@chromium.org, Oct 2

Issue description

https://listnr.corp.google.com/product/208/report/85691765240

2018-09-28T17:26:32.803379-07:00 NOTICE kernel: [  998.175291] audit: type=1326 audit(1538180792.802:560): auid=4294967295 uid=20112 gid=20112 ses=4294967295 subj=u:r:minijailed:s0 pid=5359 comm="ssh" exe="/usr/bin/ssh" sig=31 arch=c000003e syscall=25 compat=0 ip=0x7a6d8605376a code=0x0
2018-09-28T17:26:32.811343-07:00 INFO crash_reporter[8207]: libminijail[8207]: mount '/dev/log' -> '/dev/log' type '' flags 0x1001
2018-09-28T17:26:32.816950-07:00 INFO crash_reporter[8208]: libminijail[8208]: mount '/dev/log' -> '/dev/log' type '' flags 0x1001
2018-09-28T17:26:32.825198-07:00 WARNING crash_reporter[8207]: [user] Received crash notification for ssh[5359] sig 31, user 20112 group 20112 (handling)
2018-09-28T17:26:32.826074-07:00 INFO crash_reporter[8207]: State of crashed process [5359]: S (sleeping)
2018-09-28T17:26:32.826379-07:00 INFO crash_reporter[8207]: Accessing crash dir '/var/spool/crash' via symlinked handle '/proc/self/fd/6'
2018-09-28T17:26:32.832798-07:00 INFO crash_reporter[8208]: Processing selinux violation: dropped sample
2018-09-28T17:26:32.842920-07:00 INFO crash_reporter[8207]: Stored minidump to /var/spool/crash/ssh.20180928.172632.5359.dmp
2018-09-28T17:26:32.843833-07:00 WARNING crash_reporter[8207]: [ARC] Received crash notification for ssh[5359] sig 31, user 20112 group 20112 (ignoring - crash origin is not ARC)
2018-09-28T17:26:32.853254-07:00 INFO vm_cicerone[4419]:  Process 10 killed by signal 31 (core dumped)
 
... sig=31 ... syscall=25 ...

/usr/include/asm/unistd_64.h:#define __NR_mremap 25
Project Member

Comment 2 by bugdroid1@chromium.org, Oct 5

The following revision refers to this bug:
  https://chromium.googlesource.com/chromiumos/platform2/+/ad9412249b81fdc3049d8be2631cb43922ff32e6

commit ad9412249b81fdc3049d8be2631cb43922ff32e6
Author: Stephen Barber <smbarber@chromium.org>
Date: Fri Oct 05 22:43:54 2018

vm_tools: cicerone: whitelist mremap syscall

mremap is used by glibc for realloc().

BUG= chromium:891153 
TEST=localhost:8000 still works for accessing a container

Change-Id: Id21443bc1ea9462a5b2753b5a303c8beebf2d6ec
Reviewed-on: https://chromium-review.googlesource.com/1262815
Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com>
Tested-by: Stephen Barber <smbarber@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>

[modify] https://crrev.com/ad9412249b81fdc3049d8be2631cb43922ff32e6/vm_tools/init/vm_cicerone-seccomp-arm.policy
[modify] https://crrev.com/ad9412249b81fdc3049d8be2631cb43922ff32e6/vm_tools/init/vm_cicerone-seccomp-arm64.policy
[modify] https://crrev.com/ad9412249b81fdc3049d8be2631cb43922ff32e6/vm_tools/init/vm_cicerone-seccomp-amd64.policy

Status: Fixed (was: Assigned)
Cc: smbar...@chromium.org
 Issue 888354  has been merged into this issue.
Status: Verified (was: Fixed)
Verified on eve 11151.4.0.
Cc: marchuk@google.com
Labels: Hotlist-Enterprise

Sign in to add a comment