Activity log for bug #1996217

Date Who What changed Old value New value Message
2022-11-10 16:37:17 Bram Stolk bug added bug
2022-11-10 16:56:43 Nathan Teodosio tags snap
2022-11-10 17:02:29 Nathan Teodosio bug task added linux (Ubuntu)
2022-11-10 17:30:06 Ubuntu Kernel Bot linux (Ubuntu): status New Incomplete
2022-11-10 17:50:02 Bram Stolk description I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) ====== STRACE ====== When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d400000000, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d400000000 mmap(0x2e43fffff000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43fffff000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap ======= JOURNAL ======= And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 ===== SPECS ===== OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) ====== STRACE ====== When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d400000000, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d400000000 mmap(0x2e43fffff000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43fffff000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap ======= JOURNAL ======= And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 ============ SNAPPY DEBUG ============ $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x50000 Syscall: pkey_mprotect ===== SPECS ===== OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓
2022-11-10 17:53:25 Bram Stolk tags snap apport-collected kinetic snap wayland-session
2022-11-10 17:53:26 Bram Stolk description I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) ====== STRACE ====== When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d400000000, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d400000000 mmap(0x2e43fffff000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43fffff000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap ======= JOURNAL ======= And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 ============ SNAPPY DEBUG ============ $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x50000 Syscall: pkey_mprotect ===== SPECS ===== OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ I installed chromium snap from edge channel: $ snap refresh --amend --channel edge chromium chromium (edge) 109.0.5396.2 from Canonical✓ refreshed $ chromium Trace/breakpoint trap (core dumped) ====== STRACE ====== When I run it through strace, the last system calls are: ... mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0 mprotect(0x7f9013377000, 4096, PROT_READ) = 0 munmap(0x7f9012e3e000, 91649) = 0 set_tid_address(0x7f9010ae0110) = 55209 set_robust_list(0x7f9010ae0120, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8 getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8 mmap(0x27d400000000, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x27d400000000 mmap(0x2e43fffff000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x2e43fffff000 pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM (Operation not permitted) --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} --- +++ killed by SIGTRAP (core dumped) +++ error: signal: trace/breakpoint trap ======= JOURNAL ======= And the journal entries during launch: Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by gnome-shell. Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 launched by gnome-terminal-server process 40213. Nov 10 08:24:09 workpc systemd[1949]: Started snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope. Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=12 capname="net_admin" Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" capability=38 capname="perfmon" Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000] Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e syscall=329 compat=0 ip=0x7f3259ae573d code=0x50000 ============ SNAPPY DEBUG ============ $ snappy-debug INFO: Following '/var/log/syslog'. If have dropped messages, use: INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug = Seccomp = Time: Nov 10 09:48:03 Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c000003e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x50000 Syscall: pkey_mprotect ===== SPECS ===== OS: Ubuntu 22.10 Kernel: 5.19.0-21-generic CPU: 12600k snap: 109.0.5396.2 2184 latest/edge canonical✓ --- ProblemType: Bug ApportVersion: 2.23.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC0: stolk 2044 F.... wireplumber /dev/snd/controlC1: stolk 2044 F.... wireplumber /dev/snd/seq: stolk 2041 F.... pipewire CRDA: N/A CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME DistroRelease: Ubuntu 22.10 InstallationDate: Installed on 2022-08-26 (76 days ago) InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220825) MachineType: ASUS System Product Name Package: linux (not installed) ProcFB: 0 i915drmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-21-generic root=/dev/mapper/vgubuntu-root ro quiet splash intel_pstate=passive vt.handoff=7 ProcVersionSignature: Ubuntu 5.19.0-21.21-generic 5.19.7 RebootRequiredPkgs: Error: path contained symlinks. RelatedPackageVersions: linux-restricted-modules-5.19.0-21-generic N/A linux-backports-modules-5.19.0-21-generic N/A linux-firmware 20220923.gitf09bebf3-0ubuntu1 RfKill: Tags: kinetic wayland-session Uname: Linux 5.19.0-21-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dialout dip lpadmin lxd plugdev sambashare sbuild sudo _MarkForUpload: True dmi.bios.date: 01/13/2022 dmi.bios.release: 10.8 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1008 dmi.board.asset.tag: Default string dmi.board.name: PRIME Z690M-PLUS D4 dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: Rev 1.xx dmi.chassis.asset.tag: Default string dmi.chassis.type: 3 dmi.chassis.vendor: Default string dmi.chassis.version: Default string dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1008:bd01/13/2022:br10.8:svnASUS:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEZ690M-PLUSD4:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU: dmi.product.family: To be filled by O.E.M. dmi.product.name: System Product Name dmi.product.sku: SKU dmi.product.version: System Version dmi.sys.vendor: ASUS
2022-11-10 17:53:27 Bram Stolk attachment added AlsaInfo.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630392/+files/AlsaInfo.txt
2022-11-10 17:53:29 Bram Stolk attachment added CurrentDmesg.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630393/+files/CurrentDmesg.txt
2022-11-10 17:53:31 Bram Stolk attachment added IwConfig.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630394/+files/IwConfig.txt
2022-11-10 17:53:33 Bram Stolk attachment added Lspci.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630395/+files/Lspci.txt
2022-11-10 17:53:34 Bram Stolk attachment added Lspci-vt.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630396/+files/Lspci-vt.txt
2022-11-10 17:53:36 Bram Stolk attachment added Lsusb.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630397/+files/Lsusb.txt
2022-11-10 17:53:38 Bram Stolk attachment added Lsusb-t.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630398/+files/Lsusb-t.txt
2022-11-10 17:53:40 Bram Stolk attachment added Lsusb-v.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630399/+files/Lsusb-v.txt
2022-11-10 17:53:42 Bram Stolk attachment added ProcCpuinfo.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630400/+files/ProcCpuinfo.txt
2022-11-10 17:53:44 Bram Stolk attachment added ProcCpuinfoMinimal.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630401/+files/ProcCpuinfoMinimal.txt
2022-11-10 17:53:45 Bram Stolk attachment added ProcEnviron.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630402/+files/ProcEnviron.txt
2022-11-10 17:53:48 Bram Stolk attachment added ProcInterrupts.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630403/+files/ProcInterrupts.txt
2022-11-10 17:53:50 Bram Stolk attachment added ProcModules.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630404/+files/ProcModules.txt
2022-11-10 17:53:52 Bram Stolk attachment added UdevDb.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630405/+files/UdevDb.txt
2022-11-10 17:53:55 Bram Stolk attachment added WifiSyslog.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630406/+files/WifiSyslog.txt
2022-11-10 17:54:00 Bram Stolk attachment added acpidump.txt https://bugs.launchpad.net/bugs/1996217/+attachment/5630407/+files/acpidump.txt
2022-11-10 17:55:56 Nathan Teodosio bug task deleted linux (Ubuntu)
2022-11-10 18:07:14 Nathan Teodosio bug task added snapd (Ubuntu)
2022-11-10 18:08:34 Nathan Teodosio summary SIGTRAP on launch 109.0.5396.2-2184 pkey_mprotect is not permitted