New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 911262 link

Starred by 2 users

Issue metadata

Status: Started
Owner:
Last visit 28 days ago
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

memd selinux report: avc: granted { execute } for pid=2312 comm="minijail0" name="memd" dev="dm-0" ino=95079 scontext=u:r:minijail:s0 tcontext=u:object_r:cros_unconfined_exec:s0 tclass=file

Reported by 8682...@student.cms.k12.nc.us, Dec 3

Issue description

IMPORTANT: Your crash has already been automatically reported to our crash system. Please file this bug only if you can provide more information about it.


Chrome Version: 70.0.3538.110
Operating System: Linux 11021.81.0

URL (if applicable) where crash occurred:

Can you reproduce this crash?

What steps will reproduce this crash? (If it's not reproducible, what were you doing just before the crash?)
1.
2.
3.

****DO NOT CHANGE BELOW THIS LINE****
Crash ID: crash/7602578e20a9307b

 
Components: UI>Browser>TabStrip
Owner: semenzato@chromium.org
Status: Assigned (was: Unconfirmed)
crash is in memd
Labels: OS-Chrome
Summary: Crash in memd (was: get rekt biatch)
Cc: vapier@chromium.org
Components: -UI>Browser>TabStrip OS>Systems
Labels: Pri-2 Type-Bug
Status: Started (was: Assigned)
This is a bit mysterious.  There is also this kind of crash.

https://crash.corp.google.com/browse?q=&stbtiq=memd&reportid=b9787e88fab1f18a&index=0

with this attached log:

type=1400  avc:  granted  { execute } for  pid=2312 comm="minijail0" name="memd" dev="dm-0" ino=95079 scontext=u:r:minijail:s0 tcontext=u:object_r:cros_unconfined_exec:s0 tclass=file

but that doesn't look like an error message---in fact it sounds rather positive.

Annoyingly, all of those reports (afaict) didn't get the kernel version.

Also, are we messing up the signature in these reports?  If they get spread over a lot of different signatures, we won't notice the severity (I wonder if this happened here).

Get rekt indeed!

Cc: f...@chromium.org
Qijiang, you've made some changes that affect those signatures.  Can you help explain what goes on here?  Thanks!

https://chromium-review.googlesource.com/1163411

Incidentally, those changes went in shortly before R70 forked.
Cc: semenzato@chromium.org
Owner: f...@chromium.org
Actually, may I assign this to you for the time being?  I am hoping you can add some explanation and more details on this failure, and assign it back to me.  Thanks!

Labels: -Stability-Crash -Restrict-View-EditIssue
Summary: memd selinux report: avc: granted { execute } for pid=2312 comm="minijail0" name="memd" dev="dm-0" ino=95079 scontext=u:r:minijail:s0 tcontext=u:object_r:cros_unconfined_exec:s0 tclass=file (was: Crash in memd)
selinux "granted" audit reports aren't crashes, they're advisory that we need to update selinux policy.  fqj@ has been handling that so far.
M72 removed most of grants to be audited.

These grants were used to discover unconfined operations (many execute/file creation/transition) on different boards.
These unconfined allows will either be confined (for example, what's in this bug should be allowed and transited to a different domain instead of staying at minijail), or denied (for example, many dac_override).

It turns out to be too noisy (especially for dev image since it doesn't sample 0.1% before collection) to collect these information until we confined most of stuffs.


Mike,
Do you think whether it's necessary to cherry-pick these "removal" to stable? FYI: user selinux "crashes" are sampled at 0.1%.
It's going to take some human work to handle many merge conflicts by only cherry-picking some changes since SEPolicy is actively being developed.


if it's resolved in R72, imo that's fine. it has already branched, so there's pressure to not make changes to R71 or older unless necessary.

just talk to the TPMs and let them know which reports in R71 they can effectively ignore.
#8 for my benefit, what are these "unconfined operations"?  Do you have other more descriptive bugs or docs you can point me to?  Thanks!
unconfined operations means:
1) we haven't worked that far to reach this process/domain.
2) we didn't see this on betty, betty-arcnext, or kevin. meaning this is something only on some boards.

"minijail execute memed" is obviously case (1), which is partially confined in M72 (transition rule confined, other permissions not)

Also we masked a lot of auditallow in M72 so case (1) won't trigger any spams for non-SELinux-rule developer, since the auditallow is mostly used to discover case (2), to reduce the chance of breaking things before putting something enforced.

Unfortunately there's no more descriptive bugs for unconfined domains, because unconfined here means "we haven't worked that far or we didn't see it on either betty/betty-arcnext or kevin"


Issue 915798 has been merged into this issue.

Sign in to add a comment