With a bit of effort, the address you see:

     addr=0x67cb1d220

can be compared in the ktrace to earlier mmap() operations (done by the
shared library linker ld.so); those mmap are mappings against a file descriptor,
and you can see what library file ld.so opened just previously... then we know
what library still has a BTI issue.

Laurence Tratt <lau...@tratt.net> wrote:

> On Mon, Mar 11, 2024 at 12:25:52PM +0000, Stuart Henderson wrote:
> 
> Hello Stuart,
> 
> >> On current, with packages upto date as of Saturday, I get a consistent
> >> SIGILL with Google Meet and the 3 Chromium browsers I'm aware of
> >> (Chromium, Iridium, Ungoogled-Chromium). It seems like it might be
> >> something to do with webcam/video processing in these browsers, but I'm
> >> far from sure.
> >>
> >> To replicate here's what I do:
> >>
> >> 1. Open a new private window (this probably isn't important but force of
> >> habit, but does mean a somewhat more consistent setup).
> >>
> >> 2. Go to meet.google.com and sign in.
> >>
> >> 3. Start a new meeting, and enable both microphone and webcam. As soon
> >> as the main "you should be able to see everyone else screen" is about to
> >> start, I get SIGILL.
> ...
> > Please ktrace and kdump | grep ILL, it should show the type of SIGILL. If
> > you're on Intel 11th gen or newer there's a good chance it will be
> > IBT-related.
> 
> Stuart pointed out off-list that `ktrace -i` is needed. With that I get:
> 
>   69377 chrome   PSIG  SIGILL SIG_DFL code=ILL_BTCFI addr=0x67cb1d220 
> trapno=21
> 
> I'm not sure if/how to get a backtrace out of any of the Chrome variants...
> 
> 
> Laurie
> 

Reply via email to