[Kernel-packages] [Bug 2003111] Re: ASAN catches bug in v4l kernel module.

2023-01-17 Thread Bram Stolk
lunar running on VM, kernel version 5.19.0-21-generic is not affected.

kinetic running on HW, kernel version 5.19.0-29-generic is affected.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2003111

Title:
  ASAN catches bug in v4l kernel module.

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  The package linux-modules-extra-5.19.0-29-generic has a kernel module
  named vivid.ko for artificial v4l streams.

  When I modprobe the vivid.ko module, an invalid operation is detected
  by ASAN, and the created of /dev/video0 device file fails.

  The offending call is v4l_querymenu

  The offending operation is shift-out-of-bounds

  I tried this in a virtual machine of lunar (23.04) where the modprobe
  succeeded. But it fails on the real machine, running kinetic (22.10)

  This is a kernel bug.

  
  ```
  [ 6028.277644] vivid-000: using single planar format API
  [ 6028.278261] Registered IR keymap rc-cec
  [ 6028.278304] rc rc0: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0
  [ 6028.278329] input: vivid-000-vid-cap0 as 
/devices/platform/vivid.0/rc/rc0/input34
  [ 6028.278395] vivid-000: CEC adapter cec0 registered for HDMI input 0
  [ 6028.278420] vivid-000: V4L2 capture device registered as video3
  [ 6028.278422] Registered IR keymap rc-cec
  [ 6028.278433] rc rc1: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1
  [ 6028.278451] input: vivid-000-vid-out0 as 
/devices/platform/vivid.0/rc/rc1/input35
  [ 6028.278491] vivid-000: CEC adapter cec1 registered for HDMI output 0
  [ 6028.278512] vivid-000: V4L2 output device registered as video4
  [ 6028.278531] vivid-000: V4L2 capture device registered as vbi0, supports 
raw and sliced VBI
  [ 6028.278550] vivid-000: V4L2 output device registered as vbi1, supports raw 
and sliced VBI
  [ 6028.278571] vivid-000: V4L2 capture device registered as swradio0
  [ 6028.278590] vivid-000: V4L2 receiver device registered as radio0
  [ 6028.278609] vivid-000: V4L2 transmitter device registered as radio1
  [ 6028.278628] vivid-000: V4L2 metadata capture device registered as video5
  [ 6028.278649] vivid-000: V4L2 metadata output device registered as video6
  [ 6028.278669] vivid-000: V4L2 touch capture device registered as v4l-touch0
  [ 6028.302648] 

  [ 6028.302651] UBSAN: shift-out-of-bounds in 
/build/linux-qLbdtO/linux-5.19.0/drivers/media/v4l2-core/v4l2-ctrls-api.c:1102:35
  [ 6028.302652] shift exponent 64 is too large for 64-bit type 'long long 
unsigned int'
  [ 6028.302654] CPU: 4 PID: 2138 Comm: pipewire Not tainted 5.19.0-29-generic 
#30-Ubuntu
  [ 6028.302656] Hardware name: ASUS System Product Name/PRIME Z690M-PLUS D4, 
BIOS 1008 01/13/2022
  [ 6028.302656] Call Trace:
  [ 6028.302657]  
  [ 6028.302659]  show_stack+0x4e/0x61
  [ 6028.302663]  dump_stack_lvl+0x4a/0x6f
  [ 6028.302665]  dump_stack+0x10/0x18
  [ 6028.302666]  ubsan_epilogue+0x9/0x43
  [ 6028.302668]  __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef
  [ 6028.302669]  ? mutex_lock+0x12/0x50
  [ 6028.302673]  v4l2_querymenu.cold+0x24/0x39 [videodev]
  [ 6028.302681]  v4l_querymenu+0x81/0xa0 [videodev]
  [ 6028.302686]  __video_do_ioctl+0x1e7/0x590 [videodev]
  [ 6028.302691]  video_usercopy+0x14b/0x730 [videodev]
  [ 6028.302696]  ? video_get_user.constprop.0+0x1d0/0x1d0 [videodev]
  [ 6028.302700]  video_ioctl2+0x15/0x30 [videodev]
  [ 6028.302705]  v4l2_ioctl+0x69/0xb0 [videodev]
  [ 6028.302709]  __x64_sys_ioctl+0x9d/0xe0
  [ 6028.302711]  do_syscall_64+0x58/0x90
  [ 6028.302712]  ? do_syscall_64+0x67/0x90
  [ 6028.302712]  ? do_syscall_64+0x67/0x90
  [ 6028.302713]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  [ 6028.302715] RIP: 0033:0x7f8631712d8f
  [ 6028.302717] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 
00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 
00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
  [ 6028.302717] RSP: 002b:7ffd35484ed0 EFLAGS: 0246 ORIG_RAX: 
0010
  [ 6028.302719] RAX: ffda RBX: 0400 RCX: 
7f8631712d8f
  [ 6028.302720] RDX: 7ffd35485050 RSI: c02c5625 RDI: 
0032
  [ 6028.302720] RBP: 000b R08: 0a58 R09: 
000b
  [ 6028.302721] R10: 0008000c R11: 0246 R12: 
7ffd35485058
  [ 6028.302721] R13: 7ffd35485050 R14: 55959cc26a48 R15: 
0032
  [ 6028.302723]  
  [ 6028.302724] 

  ```

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-modules-extra-5.19.0-29-generic 5.19.0-29.30
  ProcVersionSignature: Ubuntu 5.19.0-29.30-generic 5.19.17
  Uname: Linux 5.19.0-29-generic x86_64
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USE

[Kernel-packages] [Bug 2003111] [NEW] ASAN catches bug in v4l kernel module.

2023-01-17 Thread Bram Stolk
Public bug reported:

The package linux-modules-extra-5.19.0-29-generic has a kernel module
named vivid.ko for artificial v4l streams.

When I modprobe the vivid.ko module, an invalid operation is detected by
ASAN, and the created of /dev/video0 device file fails.

The offending call is v4l_querymenu

The offending operation is shift-out-of-bounds

I tried this in a virtual machine of lunar (23.04) where the modprobe
succeeded. But it fails on the real machine, running kinetic (22.10)

This is a kernel bug.


```
[ 6028.277644] vivid-000: using single planar format API
[ 6028.278261] Registered IR keymap rc-cec
[ 6028.278304] rc rc0: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0
[ 6028.278329] input: vivid-000-vid-cap0 as 
/devices/platform/vivid.0/rc/rc0/input34
[ 6028.278395] vivid-000: CEC adapter cec0 registered for HDMI input 0
[ 6028.278420] vivid-000: V4L2 capture device registered as video3
[ 6028.278422] Registered IR keymap rc-cec
[ 6028.278433] rc rc1: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1
[ 6028.278451] input: vivid-000-vid-out0 as 
/devices/platform/vivid.0/rc/rc1/input35
[ 6028.278491] vivid-000: CEC adapter cec1 registered for HDMI output 0
[ 6028.278512] vivid-000: V4L2 output device registered as video4
[ 6028.278531] vivid-000: V4L2 capture device registered as vbi0, supports raw 
and sliced VBI
[ 6028.278550] vivid-000: V4L2 output device registered as vbi1, supports raw 
and sliced VBI
[ 6028.278571] vivid-000: V4L2 capture device registered as swradio0
[ 6028.278590] vivid-000: V4L2 receiver device registered as radio0
[ 6028.278609] vivid-000: V4L2 transmitter device registered as radio1
[ 6028.278628] vivid-000: V4L2 metadata capture device registered as video5
[ 6028.278649] vivid-000: V4L2 metadata output device registered as video6
[ 6028.278669] vivid-000: V4L2 touch capture device registered as v4l-touch0
[ 6028.302648] 

[ 6028.302651] UBSAN: shift-out-of-bounds in 
/build/linux-qLbdtO/linux-5.19.0/drivers/media/v4l2-core/v4l2-ctrls-api.c:1102:35
[ 6028.302652] shift exponent 64 is too large for 64-bit type 'long long 
unsigned int'
[ 6028.302654] CPU: 4 PID: 2138 Comm: pipewire Not tainted 5.19.0-29-generic 
#30-Ubuntu
[ 6028.302656] Hardware name: ASUS System Product Name/PRIME Z690M-PLUS D4, 
BIOS 1008 01/13/2022
[ 6028.302656] Call Trace:
[ 6028.302657]  
[ 6028.302659]  show_stack+0x4e/0x61
[ 6028.302663]  dump_stack_lvl+0x4a/0x6f
[ 6028.302665]  dump_stack+0x10/0x18
[ 6028.302666]  ubsan_epilogue+0x9/0x43
[ 6028.302668]  __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef
[ 6028.302669]  ? mutex_lock+0x12/0x50
[ 6028.302673]  v4l2_querymenu.cold+0x24/0x39 [videodev]
[ 6028.302681]  v4l_querymenu+0x81/0xa0 [videodev]
[ 6028.302686]  __video_do_ioctl+0x1e7/0x590 [videodev]
[ 6028.302691]  video_usercopy+0x14b/0x730 [videodev]
[ 6028.302696]  ? video_get_user.constprop.0+0x1d0/0x1d0 [videodev]
[ 6028.302700]  video_ioctl2+0x15/0x30 [videodev]
[ 6028.302705]  v4l2_ioctl+0x69/0xb0 [videodev]
[ 6028.302709]  __x64_sys_ioctl+0x9d/0xe0
[ 6028.302711]  do_syscall_64+0x58/0x90
[ 6028.302712]  ? do_syscall_64+0x67/0x90
[ 6028.302712]  ? do_syscall_64+0x67/0x90
[ 6028.302713]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 6028.302715] RIP: 0033:0x7f8631712d8f
[ 6028.302717] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 
00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 
00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[ 6028.302717] RSP: 002b:7ffd35484ed0 EFLAGS: 0246 ORIG_RAX: 
0010
[ 6028.302719] RAX: ffda RBX: 0400 RCX: 7f8631712d8f
[ 6028.302720] RDX: 7ffd35485050 RSI: c02c5625 RDI: 0032
[ 6028.302720] RBP: 000b R08: 0a58 R09: 000b
[ 6028.302721] R10: 0008000c R11: 0246 R12: 7ffd35485058
[ 6028.302721] R13: 7ffd35485050 R14: 55959cc26a48 R15: 0032
[ 6028.302723]  
[ 6028.302724] 

```

ProblemType: Bug
DistroRelease: Ubuntu 22.10
Package: linux-modules-extra-5.19.0-29-generic 5.19.0-29.30
ProcVersionSignature: Ubuntu 5.19.0-29.30-generic 5.19.17
Uname: Linux 5.19.0-29-generic x86_64
ApportVersion: 2.23.1-0ubuntu3
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  stolk  2160 F wireplumber
 /dev/snd/controlC0:  stolk  2160 F wireplumber
 /dev/snd/seq:stolk  2138 F pipewire
CRDA: N/A
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Tue Jan 17 10:12:44 2023
Dependencies:
 linux-modules-5.19.0-29-generic 5.19.0-29.30
 wireless-regdb 2022.06.06-0ubuntu1
InstallationDate: Installed on 2022-08-26 (144 days ago)
InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220825)
MachineType: ASUS System Product Name
P

[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard

2022-12-12 Thread Bram Stolk
@thedoctar Add it to GRUB_CMDLINE_LINUX_DEFAULT in /etc/default/grub
file.

$ sudo dmesg  | grep "Command line"
[0.00] Command line: BOOT_IMAGE=/vmlinuz-5.19.0-26-generic 
root=/dev/mapper/vgubuntu-root ro quiet splash intel_pstate=passive 
eisa_bus.disable_dev=1,2,3,4,5,6,7,8 vt.handoff=7

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1837326

Title:
  platform eisa.0: EISA: Cannot allocate resource for mainboard

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  dmesg:
  [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard
  [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1
  [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2
  [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3
  [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4
  [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5
  [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6
  [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7
  [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.2.0-8-generic 5.2.0-8.9
  ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0
  Uname: Linux 5.2.0-8-generic x86_64
  ApportVersion: 2.20.11-0ubuntu5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   3028 F pulseaudio
   /dev/snd/pcmC0D0p:   caravena   3028 F...m pulseaudio
  CurrentDesktop: ubuntu:GNOME
  Date: Sun Jul 21 12:16:07 2019
  HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57
  InstallationDate: Installed on 2018-12-02 (230 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic 
root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.2.0-8-generic N/A
   linux-backports-modules-5.2.0-8-generic  N/A
   linux-firmware   1.181
  SourcePackage: linux
  UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago)
  dmi.bios.date: 04/29/2019
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.34
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 8486
  dmi.board.vendor: HP
  dmi.board.version: 72.23
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Pavilion
  dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx
  dmi.product.sku: 3PX63LA#ABM
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996217] acpidump.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630407/+files/acpidump.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996217] ProcCpuinfo.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630400/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] ProcEnviron.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630402/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] Lsusb-v.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630399/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu

[Kernel-packages] [Bug 1996217] Lsusb.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630397/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOM

[Kernel-packages] [Bug 1996217] Lsusb-t.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630398/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu

[Kernel-packages] [Bug 1996217] WifiSyslog.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630406/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: 

[Kernel-packages] [Bug 1996217] ProcInterrupts.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630403/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentD

[Kernel-packages] [Bug 1996217] ProcModules.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630404/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] UdevDb.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630405/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GN

[Kernel-packages] [Bug 1996217] ProcCpuinfoMinimal.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630401/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  

[Kernel-packages] [Bug 1996217] Lspci-vt.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630396/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996217] Lspci.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630395/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOM

[Kernel-packages] [Bug 1996217] CurrentDmesg.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630393/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDeskt

[Kernel-packages] [Bug 1996217] IwConfig.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630394/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996217] Re: SIGTRAP on launch 109.0.5396.2-2184

2022-11-10 Thread Bram Stolk
apport information

** Description changed:

  I installed chromium snap from edge channel:
  
  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)
  
  ==
  STRACE
  ==
- 
  
  When I run it through strace, the last system calls are:
  
  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap
  
- 
  ===
  JOURNAL
  ===
  
  And the journal entries during launch:
  
  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  
  
+ 
+ SNAPPY DEBUG
+ 
+ 
+ $ snappy-debug
+ INFO: Following '/var/log/syslog'. If have dropped messages, use:
+ INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
+ = Seccomp =
+ Time: Nov 10 09:48:03
+ Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
+ Syscall: pkey_mprotect
+ 
+ 
+ 
  =
  SPECS
  =
  
  OS: Ubuntu 22.10
  
  Kernel: 5.19.0-21-generic
  
  CPU: 12600k
  
  snap: 109.0.5396.2  2184   latest/edge  canonical✓

** Tags added: apport-collected kinetic wayland-session

** Description changed:

  I installed chromium snap from edge channel:
  
  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)
  
  ==
  STRACE
  ==
  
  When I run it through strace, the last system calls are:
  
  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_R

[Kernel-packages] [Bug 1959721] Re: unchecked MSR access error: WRMSR to 0xd10

2022-06-05 Thread Bram Stolk
I am hitting this with 5.15.0-35-generic.

ASUS Prime Z690M-PLUS D4 with i12600k CPU.

Jun 05 17:42:38 deca kernel: unchecked MSR access error: WRMSR to 0xd10 (tried 
to write 0x) at rIP: 0xfff>
Jun 05 17:42:38 deca kernel: Call Trace:
Jun 05 17:42:38 deca kernel:  
Jun 05 17:42:38 deca kernel:  ? cat_wrmsr+0x43/0x60
Jun 05 17:42:38 deca kernel:  domain_add_cpu+0x2c9/0x470
Jun 05 17:42:38 deca kernel:  ? domain_add_cpu+0x470/0x470
Jun 05 17:42:38 deca kernel:  resctrl_online_cpu+0x4d/0xb0
Jun 05 17:42:38 deca kernel:  cpuhp_invoke_callback+0x108/0x410
Jun 05 17:42:38 deca kernel:  cpuhp_thread_fun+0xc0/0x1b0
Jun 05 17:42:38 deca kernel:  smpboot_thread_fn+0xb7/0x150
Jun 05 17:42:38 deca kernel:  ? smpboot_register_percpu_thread+0x130/0x130
Jun 05 17:42:38 deca kernel:  kthread+0x127/0x150
Jun 05 17:42:38 deca kernel:  ? set_kthread_struct+0x50/0x50
Jun 05 17:42:38 deca kernel:  ret_from_fork+0x1f/0x30
Jun 05 17:42:38 deca kernel:  


-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1959721

Title:
  unchecked MSR access error: WRMSR to 0xd10

Status in linux-signed package in Ubuntu:
  Confirmed

Bug description:
  When booting 5.13.0-28-generic on a fully up-to-date Ubuntu 21.10 I
  get:

  [0.526209] unchecked MSR access error: WRMSR to 0xd10 (tried to write 
0x) at rIP: 0xb8880b34 (native_write_msr+0x4/0x30)
  [0.527769] Call Trace:
  [0.528290]  
  [0.528805]  ? cat_wrmsr+0x4c/0x70
  [0.529348]  domain_add_cpu+0x2b2/0x430
  [0.529840]  ? domain_add_cpu+0x430/0x430
  [0.530326]  resctrl_online_cpu+0x4d/0xb0
  [0.530811]  cpuhp_invoke_callback+0x298/0x420
  [0.531295]  cpuhp_thread_fun+0x92/0x150
  [0.531771]  smpboot_thread_fn+0xcd/0x170
  [0.532245]  kthread+0x11c/0x140
  [0.532714]  ? smpboot_register_percpu_thread+0xe0/0xe0
  [0.533184]  ? set_kthread_struct+0x50/0x50
  [0.533908]  ret_from_fork+0x1f/0x30
  [0.534373]  

  CPU: i5-12600k
  MB: ASUS PRIME Z690M-PLUS D4

  This is on a CPU with both performance (6 w HT) and efficiency (4)
  cores:

  root@deca:/home/bram# cat /proc/cpuinfo 
  processor : 0
  vendor_id : GenuineIntel
  cpu family: 6
  model : 151
  model name: 12th Gen Intel(R) Core(TM) i5-12600K
  stepping  : 2
  microcode : 0x18
  cpu MHz   : 800.000
  cache size: 20480 KB
  physical id   : 0
  siblings  : 16
  core id   : 0
  cpu cores : 10
  apicid: 0
  initial apicid: 0
  fpu   : yes
  fpu_exception : yes
  cpuid level   : 32
  wp: yes
  flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb 
rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology 
nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl 
vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe 
popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch 
cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced 
tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep 
bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni 
xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln 
pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg 
gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize 
pconfig arch_lbr flush_l1d arch_capabilities
  vmx flags : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad 
ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid 
unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec 
tsc_scaling usr_wait_pause
  bugs  : spectre_v1 spectre_v2 spec_store_bypass swapgs
  bogomips  : 7372.80
  clflush size  : 64
  cache_alignment   : 64
  address sizes : 46 bits physical, 48 bits virtual
  power management:

  processor : 1
  vendor_id : GenuineIntel
  cpu family: 6
  model : 151
  model name: 12th Gen Intel(R) Core(TM) i5-12600K
  stepping  : 2
  microcode : 0x18
  cpu MHz   : 800.000
  cache size: 20480 KB
  physical id   : 0
  siblings  : 16
  core id   : 0
  cpu cores : 10
  apicid: 1
  initial apicid: 1
  fpu   : yes
  fpu_exception : yes
  cpuid level   : 32
  wp: yes
  flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb 
rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology 
nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl 
vmx smx est tm2 ssse3 sdbg fma 

[Kernel-packages] [Bug 1959721] [NEW] unchecked MSR access error: WRMSR to 0xd10

2022-02-01 Thread Bram Stolk
Public bug reported:

When booting 5.13.0-28-generic on a fully up-to-date Ubuntu 21.10 I get:

[0.526209] unchecked MSR access error: WRMSR to 0xd10 (tried to write 
0x) at rIP: 0xb8880b34 (native_write_msr+0x4/0x30)
[0.527769] Call Trace:
[0.528290]  
[0.528805]  ? cat_wrmsr+0x4c/0x70
[0.529348]  domain_add_cpu+0x2b2/0x430
[0.529840]  ? domain_add_cpu+0x430/0x430
[0.530326]  resctrl_online_cpu+0x4d/0xb0
[0.530811]  cpuhp_invoke_callback+0x298/0x420
[0.531295]  cpuhp_thread_fun+0x92/0x150
[0.531771]  smpboot_thread_fn+0xcd/0x170
[0.532245]  kthread+0x11c/0x140
[0.532714]  ? smpboot_register_percpu_thread+0xe0/0xe0
[0.533184]  ? set_kthread_struct+0x50/0x50
[0.533908]  ret_from_fork+0x1f/0x30
[0.534373]  

CPU: i5-12600k
MB: ASUS PRIME Z690M-PLUS D4

This is on a CPU with both performance (6 w HT) and efficiency (4)
cores:

root@deca:/home/bram# cat /proc/cpuinfo 
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 151
model name  : 12th Gen Intel(R) Core(TM) i5-12600K
stepping: 2
microcode   : 0x18
cpu MHz : 800.000
cache size  : 20480 KB
physical id : 0
siblings: 16
core id : 0
cpu cores   : 10
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 32
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb 
rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology 
nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl 
vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe 
popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch 
cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced 
tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep 
bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni 
xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln 
pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg 
gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize 
pconfig arch_lbr flush_l1d arch_capabilities
vmx flags   : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad 
ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid 
unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec 
tsc_scaling usr_wait_pause
bugs: spectre_v1 spectre_v2 spec_store_bypass swapgs
bogomips: 7372.80
clflush size: 64
cache_alignment : 64
address sizes   : 46 bits physical, 48 bits virtual
power management:

processor   : 1
vendor_id   : GenuineIntel
cpu family  : 6
model   : 151
model name  : 12th Gen Intel(R) Core(TM) i5-12600K
stepping: 2
microcode   : 0x18
cpu MHz : 800.000
cache size  : 20480 KB
physical id : 0
siblings: 16
core id : 0
cpu cores   : 10
apicid  : 1
initial apicid  : 1
fpu : yes
fpu_exception   : yes
cpuid level : 32
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb 
rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology 
nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl 
vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe 
popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch 
cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced 
tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep 
bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni 
xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln 
pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg 
gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize 
pconfig arch_lbr flush_l1d arch_capabilities
vmx flags   : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad 
ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid 
unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec 
tsc_scaling usr_wait_pause
bugs: spectre_v1 spectre_v2 spec_store_bypass swapgs
bogomips: 7372.80
clflush size: 64
cache_alignment : 64
address sizes   : 46 bits physical, 48 bits virtual
power management:

processor   : 2
vendor_id   : GenuineIntel
cpu family  : 6
model   : 151
model name  : 12th Gen Intel(R) Core(TM) i5-12600K
stepping: 2
microcode   : 0x18
cpu MHz : 800.000
cache size  : 20480 KB
physical id : 0
siblings

[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard

2022-01-21 Thread Bram Stolk
Still present in Ubuntu 21.10

[0.602702] platform eisa.0: Probing EISA bus 0
[0.603265] platform eisa.0: EISA: Cannot allocate resource for mainboard
[0.603837] platform eisa.0: Cannot allocate resource for EISA slot 1
[0.604414] platform eisa.0: Cannot allocate resource for EISA slot 2
[0.604991] platform eisa.0: Cannot allocate resource for EISA slot 3
[0.605567] platform eisa.0: Cannot allocate resource for EISA slot 4
[0.606142] platform eisa.0: Cannot allocate resource for EISA slot 5
[0.606716] platform eisa.0: Cannot allocate resource for EISA slot 6
[0.607283] platform eisa.0: Cannot allocate resource for EISA slot 7
[0.607832] platform eisa.0: Cannot allocate resource for EISA slot 8
[0.608374] platform eisa.0: EISA: Detected 0 cards

I tried to avoid this by adding to my kernel parameters:

eisa_bus.disable_dev=1,2,3,4,5,6,7,8

But somehow that did not stop the eisa driver from allocating resources
for the slot.

EISA needs to be a module, instead of hard-baked into the kernel!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1837326

Title:
  platform eisa.0: EISA: Cannot allocate resource for mainboard

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  dmesg:
  [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard
  [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1
  [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2
  [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3
  [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4
  [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5
  [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6
  [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7
  [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.2.0-8-generic 5.2.0-8.9
  ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0
  Uname: Linux 5.2.0-8-generic x86_64
  ApportVersion: 2.20.11-0ubuntu5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   3028 F pulseaudio
   /dev/snd/pcmC0D0p:   caravena   3028 F...m pulseaudio
  CurrentDesktop: ubuntu:GNOME
  Date: Sun Jul 21 12:16:07 2019
  HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57
  InstallationDate: Installed on 2018-12-02 (230 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic 
root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.2.0-8-generic N/A
   linux-backports-modules-5.2.0-8-generic  N/A
   linux-firmware   1.181
  SourcePackage: linux
  UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago)
  dmi.bios.date: 04/29/2019
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.34
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 8486
  dmi.board.vendor: HP
  dmi.board.version: 72.23
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Pavilion
  dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx
  dmi.product.sku: 3PX63LA#ABM
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1543919] Re: Remove EISA support from main kernel image and make it M (modular)

2021-02-23 Thread Bram Stolk
Still an issue with latest kernel on 20.10

# uname -a
Linux Workstation 5.8.0-43-generic #49-Ubuntu SMP Fri Feb 5 03:01:28 UTC 2021 
x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1543919

Title:
  Remove EISA support from main kernel image and make it M (modular)

Status in linux package in Ubuntu:
  Triaged

Bug description:
  (This is a sort of RfC. )

  I have a PC that still has the good old PCI ports, but I am 100% sure that 
the active use of EISA dates back yet more 10 years.
  In other words, boards that _only_ support EISA date back 25 years now, while 
those that provide *one* EISA slot date back roughly 15 years (one of the 
Elitegroup K7 series comes to mind, from about 2001/02).

  So the EISA support *should* be provided, as we should even support ancient 
hardware (Linux principle :))
  However, why the EISA support is *compiled in* is beyond me.

  For instance, it creates lots of totally unnecessary noise in dmesg:

  [0.08] EISA bus registered
  [1.598316] platform eisa.0: Probing EISA bus 0
  [1.598345] platform eisa.0: Cannot allocate resource for EISA slot 1  
(repeated 10 times, i=i+1)
  [1.598368] platform eisa.0: EISA: Detected 0 cards

  For a 1997 mainboard, this would make perfect sense.
  But it is very probable that said mainboard would require linux-image-extra 
nonetheless to support some days-of-yore chipset.

  So why not leave it as a *module*, while removing its support from
  main kernel image once and for all?

  Your turn.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543919/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard

2021-02-23 Thread Bram Stolk
Still an issue on latest kernel: 5.8.0-43-generic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1837326

Title:
  platform eisa.0: EISA: Cannot allocate resource for mainboard

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  dmesg:
  [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard
  [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1
  [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2
  [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3
  [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4
  [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5
  [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6
  [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7
  [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.2.0-8-generic 5.2.0-8.9
  ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0
  Uname: Linux 5.2.0-8-generic x86_64
  ApportVersion: 2.20.11-0ubuntu5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  caravena   3028 F pulseaudio
   /dev/snd/pcmC0D0p:   caravena   3028 F...m pulseaudio
  CurrentDesktop: ubuntu:GNOME
  Date: Sun Jul 21 12:16:07 2019
  HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57
  InstallationDate: Installed on 2018-12-02 (230 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic 
root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.2.0-8-generic N/A
   linux-backports-modules-5.2.0-8-generic  N/A
   linux-firmware   1.181
  SourcePackage: linux
  UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago)
  dmi.bios.date: 04/29/2019
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.34
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 8486
  dmi.board.vendor: HP
  dmi.board.version: 72.23
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Pavilion
  dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx
  dmi.product.sku: 3PX63LA#ABM
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp