[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard
@thedoctar Add it to GRUB_CMDLINE_LINUX_DEFAULT in /etc/default/grub file. $ sudo dmesg | grep "Command line" [0.00] Command line: BOOT_IMAGE=/vmlinuz-5.19.0-26-generic root=/dev/mapper/vgubuntu-root ro quiet splash intel_pstate=passive eisa_bus.disable_dev=1,2,3,4,5,6,7,8 vt.handoff=7 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1837326 Title: platform eisa.0: EISA: Cannot allocate resource for mainboard Status in linux package in Ubuntu: Confirmed Bug description: dmesg: [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1 [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2 [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3 [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4 [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5 [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6 [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7 [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8 ProblemType: Bug DistroRelease: Ubuntu 19.10 Package: linux-image-5.2.0-8-generic 5.2.0-8.9 ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0 Uname: Linux 5.2.0-8-generic x86_64 ApportVersion: 2.20.11-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 3028 F pulseaudio /dev/snd/pcmC0D0p: caravena 3028 F...m pulseaudio CurrentDesktop: ubuntu:GNOME Date: Sun Jul 21 12:16:07 2019 HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57 InstallationDate: Installed on 2018-12-02 (230 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx ProcFB: 0 i915drmfb ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-5.2.0-8-generic N/A linux-backports-modules-5.2.0-8-generic N/A linux-firmware 1.181 SourcePackage: linux UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago) dmi.bios.date: 04/29/2019 dmi.bios.vendor: Insyde dmi.bios.version: F.34 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 8486 dmi.board.vendor: HP dmi.board.version: 72.23 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 31 dmi.chassis.vendor: HP dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion: dmi.product.family: 103C_5335KV HP Pavilion dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx dmi.product.sku: 3PX63LA#ABM dmi.product.version: Type1ProductConfigId dmi.sys.vendor: HP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2003111] [NEW] ASAN catches bug in v4l kernel module.
Public bug reported: The package linux-modules-extra-5.19.0-29-generic has a kernel module named vivid.ko for artificial v4l streams. When I modprobe the vivid.ko module, an invalid operation is detected by ASAN, and the created of /dev/video0 device file fails. The offending call is v4l_querymenu The offending operation is shift-out-of-bounds I tried this in a virtual machine of lunar (23.04) where the modprobe succeeded. But it fails on the real machine, running kinetic (22.10) This is a kernel bug. ``` [ 6028.277644] vivid-000: using single planar format API [ 6028.278261] Registered IR keymap rc-cec [ 6028.278304] rc rc0: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0 [ 6028.278329] input: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0/input34 [ 6028.278395] vivid-000: CEC adapter cec0 registered for HDMI input 0 [ 6028.278420] vivid-000: V4L2 capture device registered as video3 [ 6028.278422] Registered IR keymap rc-cec [ 6028.278433] rc rc1: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1 [ 6028.278451] input: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1/input35 [ 6028.278491] vivid-000: CEC adapter cec1 registered for HDMI output 0 [ 6028.278512] vivid-000: V4L2 output device registered as video4 [ 6028.278531] vivid-000: V4L2 capture device registered as vbi0, supports raw and sliced VBI [ 6028.278550] vivid-000: V4L2 output device registered as vbi1, supports raw and sliced VBI [ 6028.278571] vivid-000: V4L2 capture device registered as swradio0 [ 6028.278590] vivid-000: V4L2 receiver device registered as radio0 [ 6028.278609] vivid-000: V4L2 transmitter device registered as radio1 [ 6028.278628] vivid-000: V4L2 metadata capture device registered as video5 [ 6028.278649] vivid-000: V4L2 metadata output device registered as video6 [ 6028.278669] vivid-000: V4L2 touch capture device registered as v4l-touch0 [ 6028.302648] [ 6028.302651] UBSAN: shift-out-of-bounds in /build/linux-qLbdtO/linux-5.19.0/drivers/media/v4l2-core/v4l2-ctrls-api.c:1102:35 [ 6028.302652] shift exponent 64 is too large for 64-bit type 'long long unsigned int' [ 6028.302654] CPU: 4 PID: 2138 Comm: pipewire Not tainted 5.19.0-29-generic #30-Ubuntu [ 6028.302656] Hardware name: ASUS System Product Name/PRIME Z690M-PLUS D4, BIOS 1008 01/13/2022 [ 6028.302656] Call Trace: [ 6028.302657] [ 6028.302659] show_stack+0x4e/0x61 [ 6028.302663] dump_stack_lvl+0x4a/0x6f [ 6028.302665] dump_stack+0x10/0x18 [ 6028.302666] ubsan_epilogue+0x9/0x43 [ 6028.302668] __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef [ 6028.302669] ? mutex_lock+0x12/0x50 [ 6028.302673] v4l2_querymenu.cold+0x24/0x39 [videodev] [ 6028.302681] v4l_querymenu+0x81/0xa0 [videodev] [ 6028.302686] __video_do_ioctl+0x1e7/0x590 [videodev] [ 6028.302691] video_usercopy+0x14b/0x730 [videodev] [ 6028.302696] ? video_get_user.constprop.0+0x1d0/0x1d0 [videodev] [ 6028.302700] video_ioctl2+0x15/0x30 [videodev] [ 6028.302705] v4l2_ioctl+0x69/0xb0 [videodev] [ 6028.302709] __x64_sys_ioctl+0x9d/0xe0 [ 6028.302711] do_syscall_64+0x58/0x90 [ 6028.302712] ? do_syscall_64+0x67/0x90 [ 6028.302712] ? do_syscall_64+0x67/0x90 [ 6028.302713] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 6028.302715] RIP: 0033:0x7f8631712d8f [ 6028.302717] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 6028.302717] RSP: 002b:7ffd35484ed0 EFLAGS: 0246 ORIG_RAX: 0010 [ 6028.302719] RAX: ffda RBX: 0400 RCX: 7f8631712d8f [ 6028.302720] RDX: 7ffd35485050 RSI: c02c5625 RDI: 0032 [ 6028.302720] RBP: 000b R08: 0a58 R09: 000b [ 6028.302721] R10: 0008000c R11: 0246 R12: 7ffd35485058 [ 6028.302721] R13: 7ffd35485050 R14: 55959cc26a48 R15: 0032 [ 6028.302723] [ 6028.302724] ``` ProblemType: Bug DistroRelease: Ubuntu 22.10 Package: linux-modules-extra-5.19.0-29-generic 5.19.0-29.30 ProcVersionSignature: Ubuntu 5.19.0-29.30-generic 5.19.17 Uname: Linux 5.19.0-29-generic x86_64 ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: stolk 2160 F wireplumber /dev/snd/controlC0: stolk 2160 F wireplumber /dev/snd/seq:stolk 2138 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Tue Jan 17 10:12:44 2023 Dependencies: linux-modules-5.19.0-29-generic 5.19.0-29.30 wireless-regdb 2022.06.06-0ubuntu1 InstallationDate: Installed on 2022-08-26 (144 days ago) InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220825) MachineType: ASUS System Product Name P
[Kernel-packages] [Bug 2003111] Re: ASAN catches bug in v4l kernel module.
lunar running on VM, kernel version 5.19.0-21-generic is not affected. kinetic running on HW, kernel version 5.19.0-29-generic is affected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2003111 Title: ASAN catches bug in v4l kernel module. Status in linux package in Ubuntu: Confirmed Bug description: The package linux-modules-extra-5.19.0-29-generic has a kernel module named vivid.ko for artificial v4l streams. When I modprobe the vivid.ko module, an invalid operation is detected by ASAN, and the created of /dev/video0 device file fails. The offending call is v4l_querymenu The offending operation is shift-out-of-bounds I tried this in a virtual machine of lunar (23.04) where the modprobe succeeded. But it fails on the real machine, running kinetic (22.10) This is a kernel bug. ``` [ 6028.277644] vivid-000: using single planar format API [ 6028.278261] Registered IR keymap rc-cec [ 6028.278304] rc rc0: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0 [ 6028.278329] input: vivid-000-vid-cap0 as /devices/platform/vivid.0/rc/rc0/input34 [ 6028.278395] vivid-000: CEC adapter cec0 registered for HDMI input 0 [ 6028.278420] vivid-000: V4L2 capture device registered as video3 [ 6028.278422] Registered IR keymap rc-cec [ 6028.278433] rc rc1: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1 [ 6028.278451] input: vivid-000-vid-out0 as /devices/platform/vivid.0/rc/rc1/input35 [ 6028.278491] vivid-000: CEC adapter cec1 registered for HDMI output 0 [ 6028.278512] vivid-000: V4L2 output device registered as video4 [ 6028.278531] vivid-000: V4L2 capture device registered as vbi0, supports raw and sliced VBI [ 6028.278550] vivid-000: V4L2 output device registered as vbi1, supports raw and sliced VBI [ 6028.278571] vivid-000: V4L2 capture device registered as swradio0 [ 6028.278590] vivid-000: V4L2 receiver device registered as radio0 [ 6028.278609] vivid-000: V4L2 transmitter device registered as radio1 [ 6028.278628] vivid-000: V4L2 metadata capture device registered as video5 [ 6028.278649] vivid-000: V4L2 metadata output device registered as video6 [ 6028.278669] vivid-000: V4L2 touch capture device registered as v4l-touch0 [ 6028.302648] [ 6028.302651] UBSAN: shift-out-of-bounds in /build/linux-qLbdtO/linux-5.19.0/drivers/media/v4l2-core/v4l2-ctrls-api.c:1102:35 [ 6028.302652] shift exponent 64 is too large for 64-bit type 'long long unsigned int' [ 6028.302654] CPU: 4 PID: 2138 Comm: pipewire Not tainted 5.19.0-29-generic #30-Ubuntu [ 6028.302656] Hardware name: ASUS System Product Name/PRIME Z690M-PLUS D4, BIOS 1008 01/13/2022 [ 6028.302656] Call Trace: [ 6028.302657] [ 6028.302659] show_stack+0x4e/0x61 [ 6028.302663] dump_stack_lvl+0x4a/0x6f [ 6028.302665] dump_stack+0x10/0x18 [ 6028.302666] ubsan_epilogue+0x9/0x43 [ 6028.302668] __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef [ 6028.302669] ? mutex_lock+0x12/0x50 [ 6028.302673] v4l2_querymenu.cold+0x24/0x39 [videodev] [ 6028.302681] v4l_querymenu+0x81/0xa0 [videodev] [ 6028.302686] __video_do_ioctl+0x1e7/0x590 [videodev] [ 6028.302691] video_usercopy+0x14b/0x730 [videodev] [ 6028.302696] ? video_get_user.constprop.0+0x1d0/0x1d0 [videodev] [ 6028.302700] video_ioctl2+0x15/0x30 [videodev] [ 6028.302705] v4l2_ioctl+0x69/0xb0 [videodev] [ 6028.302709] __x64_sys_ioctl+0x9d/0xe0 [ 6028.302711] do_syscall_64+0x58/0x90 [ 6028.302712] ? do_syscall_64+0x67/0x90 [ 6028.302712] ? do_syscall_64+0x67/0x90 [ 6028.302713] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 6028.302715] RIP: 0033:0x7f8631712d8f [ 6028.302717] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 6028.302717] RSP: 002b:7ffd35484ed0 EFLAGS: 0246 ORIG_RAX: 0010 [ 6028.302719] RAX: ffda RBX: 0400 RCX: 7f8631712d8f [ 6028.302720] RDX: 7ffd35485050 RSI: c02c5625 RDI: 0032 [ 6028.302720] RBP: 000b R08: 0a58 R09: 000b [ 6028.302721] R10: 0008000c R11: 0246 R12: 7ffd35485058 [ 6028.302721] R13: 7ffd35485050 R14: 55959cc26a48 R15: 0032 [ 6028.302723] [ 6028.302724] ``` ProblemType: Bug DistroRelease: Ubuntu 22.10 Package: linux-modules-extra-5.19.0-29-generic 5.19.0-29.30 ProcVersionSignature: Ubuntu 5.19.0-29.30-generic 5.19.17 Uname: Linux 5.19.0-29-generic x86_64 ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USE
[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard
Still present in Ubuntu 21.10 [0.602702] platform eisa.0: Probing EISA bus 0 [0.603265] platform eisa.0: EISA: Cannot allocate resource for mainboard [0.603837] platform eisa.0: Cannot allocate resource for EISA slot 1 [0.604414] platform eisa.0: Cannot allocate resource for EISA slot 2 [0.604991] platform eisa.0: Cannot allocate resource for EISA slot 3 [0.605567] platform eisa.0: Cannot allocate resource for EISA slot 4 [0.606142] platform eisa.0: Cannot allocate resource for EISA slot 5 [0.606716] platform eisa.0: Cannot allocate resource for EISA slot 6 [0.607283] platform eisa.0: Cannot allocate resource for EISA slot 7 [0.607832] platform eisa.0: Cannot allocate resource for EISA slot 8 [0.608374] platform eisa.0: EISA: Detected 0 cards I tried to avoid this by adding to my kernel parameters: eisa_bus.disable_dev=1,2,3,4,5,6,7,8 But somehow that did not stop the eisa driver from allocating resources for the slot. EISA needs to be a module, instead of hard-baked into the kernel! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1837326 Title: platform eisa.0: EISA: Cannot allocate resource for mainboard Status in linux package in Ubuntu: Confirmed Bug description: dmesg: [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1 [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2 [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3 [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4 [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5 [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6 [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7 [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8 ProblemType: Bug DistroRelease: Ubuntu 19.10 Package: linux-image-5.2.0-8-generic 5.2.0-8.9 ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0 Uname: Linux 5.2.0-8-generic x86_64 ApportVersion: 2.20.11-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 3028 F pulseaudio /dev/snd/pcmC0D0p: caravena 3028 F...m pulseaudio CurrentDesktop: ubuntu:GNOME Date: Sun Jul 21 12:16:07 2019 HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57 InstallationDate: Installed on 2018-12-02 (230 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx ProcFB: 0 i915drmfb ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-5.2.0-8-generic N/A linux-backports-modules-5.2.0-8-generic N/A linux-firmware 1.181 SourcePackage: linux UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago) dmi.bios.date: 04/29/2019 dmi.bios.vendor: Insyde dmi.bios.version: F.34 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 8486 dmi.board.vendor: HP dmi.board.version: 72.23 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 31 dmi.chassis.vendor: HP dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion: dmi.product.family: 103C_5335KV HP Pavilion dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx dmi.product.sku: 3PX63LA#ABM dmi.product.version: Type1ProductConfigId dmi.sys.vendor: HP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959721] [NEW] unchecked MSR access error: WRMSR to 0xd10
Public bug reported: When booting 5.13.0-28-generic on a fully up-to-date Ubuntu 21.10 I get: [0.526209] unchecked MSR access error: WRMSR to 0xd10 (tried to write 0x) at rIP: 0xb8880b34 (native_write_msr+0x4/0x30) [0.527769] Call Trace: [0.528290] [0.528805] ? cat_wrmsr+0x4c/0x70 [0.529348] domain_add_cpu+0x2b2/0x430 [0.529840] ? domain_add_cpu+0x430/0x430 [0.530326] resctrl_online_cpu+0x4d/0xb0 [0.530811] cpuhp_invoke_callback+0x298/0x420 [0.531295] cpuhp_thread_fun+0x92/0x150 [0.531771] smpboot_thread_fn+0xcd/0x170 [0.532245] kthread+0x11c/0x140 [0.532714] ? smpboot_register_percpu_thread+0xe0/0xe0 [0.533184] ? set_kthread_struct+0x50/0x50 [0.533908] ret_from_fork+0x1f/0x30 [0.534373] CPU: i5-12600k MB: ASUS PRIME Z690M-PLUS D4 This is on a CPU with both performance (6 w HT) and efficiency (4) cores: root@deca:/home/bram# cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 151 model name : 12th Gen Intel(R) Core(TM) i5-12600K stepping: 2 microcode : 0x18 cpu MHz : 800.000 cache size : 20480 KB physical id : 0 siblings: 16 core id : 0 cpu cores : 10 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 32 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize pconfig arch_lbr flush_l1d arch_capabilities vmx flags : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec tsc_scaling usr_wait_pause bugs: spectre_v1 spectre_v2 spec_store_bypass swapgs bogomips: 7372.80 clflush size: 64 cache_alignment : 64 address sizes : 46 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 151 model name : 12th Gen Intel(R) Core(TM) i5-12600K stepping: 2 microcode : 0x18 cpu MHz : 800.000 cache size : 20480 KB physical id : 0 siblings: 16 core id : 0 cpu cores : 10 apicid : 1 initial apicid : 1 fpu : yes fpu_exception : yes cpuid level : 32 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize pconfig arch_lbr flush_l1d arch_capabilities vmx flags : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec tsc_scaling usr_wait_pause bugs: spectre_v1 spectre_v2 spec_store_bypass swapgs bogomips: 7372.80 clflush size: 64 cache_alignment : 64 address sizes : 46 bits physical, 48 bits virtual power management: processor : 2 vendor_id : GenuineIntel cpu family : 6 model : 151 model name : 12th Gen Intel(R) Core(TM) i5-12600K stepping: 2 microcode : 0x18 cpu MHz : 800.000 cache size : 20480 KB physical id : 0 siblings
[Kernel-packages] [Bug 1959721] Re: unchecked MSR access error: WRMSR to 0xd10
I am hitting this with 5.15.0-35-generic. ASUS Prime Z690M-PLUS D4 with i12600k CPU. Jun 05 17:42:38 deca kernel: unchecked MSR access error: WRMSR to 0xd10 (tried to write 0x) at rIP: 0xfff> Jun 05 17:42:38 deca kernel: Call Trace: Jun 05 17:42:38 deca kernel: Jun 05 17:42:38 deca kernel: ? cat_wrmsr+0x43/0x60 Jun 05 17:42:38 deca kernel: domain_add_cpu+0x2c9/0x470 Jun 05 17:42:38 deca kernel: ? domain_add_cpu+0x470/0x470 Jun 05 17:42:38 deca kernel: resctrl_online_cpu+0x4d/0xb0 Jun 05 17:42:38 deca kernel: cpuhp_invoke_callback+0x108/0x410 Jun 05 17:42:38 deca kernel: cpuhp_thread_fun+0xc0/0x1b0 Jun 05 17:42:38 deca kernel: smpboot_thread_fn+0xb7/0x150 Jun 05 17:42:38 deca kernel: ? smpboot_register_percpu_thread+0x130/0x130 Jun 05 17:42:38 deca kernel: kthread+0x127/0x150 Jun 05 17:42:38 deca kernel: ? set_kthread_struct+0x50/0x50 Jun 05 17:42:38 deca kernel: ret_from_fork+0x1f/0x30 Jun 05 17:42:38 deca kernel: -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed in Ubuntu. https://bugs.launchpad.net/bugs/1959721 Title: unchecked MSR access error: WRMSR to 0xd10 Status in linux-signed package in Ubuntu: Confirmed Bug description: When booting 5.13.0-28-generic on a fully up-to-date Ubuntu 21.10 I get: [0.526209] unchecked MSR access error: WRMSR to 0xd10 (tried to write 0x) at rIP: 0xb8880b34 (native_write_msr+0x4/0x30) [0.527769] Call Trace: [0.528290] [0.528805] ? cat_wrmsr+0x4c/0x70 [0.529348] domain_add_cpu+0x2b2/0x430 [0.529840] ? domain_add_cpu+0x430/0x430 [0.530326] resctrl_online_cpu+0x4d/0xb0 [0.530811] cpuhp_invoke_callback+0x298/0x420 [0.531295] cpuhp_thread_fun+0x92/0x150 [0.531771] smpboot_thread_fn+0xcd/0x170 [0.532245] kthread+0x11c/0x140 [0.532714] ? smpboot_register_percpu_thread+0xe0/0xe0 [0.533184] ? set_kthread_struct+0x50/0x50 [0.533908] ret_from_fork+0x1f/0x30 [0.534373] CPU: i5-12600k MB: ASUS PRIME Z690M-PLUS D4 This is on a CPU with both performance (6 w HT) and efficiency (4) cores: root@deca:/home/bram# cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family: 6 model : 151 model name: 12th Gen Intel(R) Core(TM) i5-12600K stepping : 2 microcode : 0x18 cpu MHz : 800.000 cache size: 20480 KB physical id : 0 siblings : 16 core id : 0 cpu cores : 10 apicid: 0 initial apicid: 0 fpu : yes fpu_exception : yes cpuid level : 32 wp: yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb cat_l2 invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid rdt_a rdseed adx smap clflushopt clwb intel_pt sha_ni xsaveopt xsavec xgetbv1 xsaves split_lock_detect avx_vnni dtherm ida arat pln pts hwp hwp_notify hwp_act_window hwp_epp hwp_pkg_req umip pku ospke waitpkg gfni vaes vpclmulqdq tme rdpid movdiri movdir64b fsrm md_clear serialize pconfig arch_lbr flush_l1d arch_capabilities vmx flags : vnmi preemption_timer posted_intr invvpid ept_x_only ept_ad ept_1gb flexpriority apicv tsc_offset vtpr mtf vapic ept vpid unrestricted_guest vapic_reg vid ple shadow_vmcs ept_mode_based_exec tsc_scaling usr_wait_pause bugs : spectre_v1 spectre_v2 spec_store_bypass swapgs bogomips : 7372.80 clflush size : 64 cache_alignment : 64 address sizes : 46 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family: 6 model : 151 model name: 12th Gen Intel(R) Core(TM) i5-12600K stepping : 2 microcode : 0x18 cpu MHz : 800.000 cache size: 20480 KB physical id : 0 siblings : 16 core id : 0 cpu cores : 10 apicid: 1 initial apicid: 1 fpu : yes fpu_exception : yes cpuid level : 32 wp: yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 sdbg fma
[Kernel-packages] [Bug 1837326] Re: platform eisa.0: EISA: Cannot allocate resource for mainboard
Still an issue on latest kernel: 5.8.0-43-generic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1837326 Title: platform eisa.0: EISA: Cannot allocate resource for mainboard Status in linux package in Ubuntu: Confirmed Bug description: dmesg: [0.889531] platform eisa.0: EISA: Cannot allocate resource for mainboard [0.889533] platform eisa.0: Cannot allocate resource for EISA slot 1 [0.889535] platform eisa.0: Cannot allocate resource for EISA slot 2 [0.889536] platform eisa.0: Cannot allocate resource for EISA slot 3 [0.889537] platform eisa.0: Cannot allocate resource for EISA slot 4 [0.889539] platform eisa.0: Cannot allocate resource for EISA slot 5 [0.889540] platform eisa.0: Cannot allocate resource for EISA slot 6 [0.889541] platform eisa.0: Cannot allocate resource for EISA slot 7 [0.889542] platform eisa.0: Cannot allocate resource for EISA slot 8 ProblemType: Bug DistroRelease: Ubuntu 19.10 Package: linux-image-5.2.0-8-generic 5.2.0-8.9 ProcVersionSignature: Ubuntu 5.2.0-8.9-generic 5.2.0 Uname: Linux 5.2.0-8-generic x86_64 ApportVersion: 2.20.11-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: caravena 3028 F pulseaudio /dev/snd/pcmC0D0p: caravena 3028 F...m pulseaudio CurrentDesktop: ubuntu:GNOME Date: Sun Jul 21 12:16:07 2019 HibernationDevice: RESUME=UUID=efcf081f-0bb0-4907-b78c-1299aa4aee57 InstallationDate: Installed on 2018-12-02 (230 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) MachineType: HP HP Pavilion x360 Convertible 14-cd0xxx ProcFB: 0 i915drmfb ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.2.0-8-generic root=UUID=28bdadba-133c-4f5b-a5c9-b06993ea7ce2 ro rootflags=subvol=@ quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-5.2.0-8-generic N/A linux-backports-modules-5.2.0-8-generic N/A linux-firmware 1.181 SourcePackage: linux UpgradeStatus: Upgraded to eoan on 2018-12-02 (230 days ago) dmi.bios.date: 04/29/2019 dmi.bios.vendor: Insyde dmi.bios.version: F.34 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: 8486 dmi.board.vendor: HP dmi.board.version: 72.23 dmi.chassis.asset.tag: Chassis Asset Tag dmi.chassis.type: 31 dmi.chassis.vendor: HP dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsyde:bvrF.34:bd04/29/2019:svnHP:pnHPPavilionx360Convertible14-cd0xxx:pvrType1ProductConfigId:rvnHP:rn8486:rvr72.23:cvnHP:ct31:cvrChassisVersion: dmi.product.family: 103C_5335KV HP Pavilion dmi.product.name: HP Pavilion x360 Convertible 14-cd0xxx dmi.product.sku: 3PX63LA#ABM dmi.product.version: Type1ProductConfigId dmi.sys.vendor: HP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837326/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1543919] Re: Remove EISA support from main kernel image and make it M (modular)
Still an issue with latest kernel on 20.10 # uname -a Linux Workstation 5.8.0-43-generic #49-Ubuntu SMP Fri Feb 5 03:01:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1543919 Title: Remove EISA support from main kernel image and make it M (modular) Status in linux package in Ubuntu: Triaged Bug description: (This is a sort of RfC. ) I have a PC that still has the good old PCI ports, but I am 100% sure that the active use of EISA dates back yet more 10 years. In other words, boards that _only_ support EISA date back 25 years now, while those that provide *one* EISA slot date back roughly 15 years (one of the Elitegroup K7 series comes to mind, from about 2001/02). So the EISA support *should* be provided, as we should even support ancient hardware (Linux principle :)) However, why the EISA support is *compiled in* is beyond me. For instance, it creates lots of totally unnecessary noise in dmesg: [0.08] EISA bus registered [1.598316] platform eisa.0: Probing EISA bus 0 [1.598345] platform eisa.0: Cannot allocate resource for EISA slot 1 (repeated 10 times, i=i+1) [1.598368] platform eisa.0: EISA: Detected 0 cards For a 1997 mainboard, this would make perfect sense. But it is very probable that said mainboard would require linux-image-extra nonetheless to support some days-of-yore chipset. So why not leave it as a *module*, while removing its support from main kernel image once and for all? Your turn. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543919/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1996217] Re: SIGTRAP on launch 109.0.5396.2-2184
apport information ** Description changed: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == - When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap - === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 + + SNAPPY DEBUG + + + $ snappy-debug + INFO: Following '/var/log/syslog'. If have dropped messages, use: + INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug + = Seccomp = + Time: Nov 10 09:48:03 + Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 + Syscall: pkey_mprotect + + + = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ ** Tags added: apport-collected kinetic wayland-session ** Description changed: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_R
[Kernel-packages] [Bug 1996217] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630393/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDeskt
[Kernel-packages] [Bug 1996217] IwConfig.txt
apport information ** Attachment added: "IwConfig.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630394/+files/IwConfig.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubun
[Kernel-packages] [Bug 1996217] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630395/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOM
[Kernel-packages] [Bug 1996217] Lspci-vt.txt
apport information ** Attachment added: "Lspci-vt.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630396/+files/Lspci-vt.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubun
[Kernel-packages] [Bug 1996217] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630401/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass
[Kernel-packages] [Bug 1996217] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630405/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GN
[Kernel-packages] [Bug 1996217] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630403/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentD
[Kernel-packages] [Bug 1996217] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630404/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop
[Kernel-packages] [Bug 1996217] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630406/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop:
[Kernel-packages] [Bug 1996217] Lsusb-t.txt
apport information ** Attachment added: "Lsusb-t.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630398/+files/Lsusb-t.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu
[Kernel-packages] [Bug 1996217] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630397/+files/Lsusb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOM
[Kernel-packages] [Bug 1996217] Lsusb-v.txt
apport information ** Attachment added: "Lsusb-v.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630399/+files/Lsusb-v.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu
[Kernel-packages] [Bug 1996217] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630400/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop
[Kernel-packages] [Bug 1996217] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630402/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop
[Kernel-packages] [Bug 1996217] acpidump.txt
apport information ** Attachment added: "acpidump.txt" https://bugs.launchpad.net/bugs/1996217/+attachment/5630407/+files/acpidump.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1996217 Title: SIGTRAP on launch 109.0.5396.2-2184 Status in chromium-browser package in Ubuntu: New Bug description: I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) == STRACE == When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d4 mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43f000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap === JOURNAL === And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5 SNAPPY DEBUG $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5 Syscall: pkey_mprotect = SPECS = OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F wireplumber /dev/snd/controlC1: stolk 2044 F wireplumber /dev/snd/seq:stolk 2041 F pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubun