New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 896491 link

Starred by 1 user

Issue metadata

Status: Assigned
Owner:
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug-Regression



Sign in to add a comment

Lenovo N22 UI crashing

Project Member Reported by vkhabarov@chromium.org, Oct 17

Issue description

ChromeOS version: 69.0.3497.95 
ChromeOS device model: Reks
Case#: 17197509

Description: Reks devices UI crashes repeatedly immediately after login after update to v69. Reverting to v68 resolves the issue.
Example Crash IDs - 
ce5c9bd852492d92
b3d0127f4b1e25cd
Crashes show 00000f7e-exit2-ui and 
2018-10-17T08:53:37.117014-05:00 INFO kernel: [ 117.270334] traps: Chrome_IOThread[3854] trap invalid opcode ip:57e504792b68 sp:710f255cb420 error:0 in chrome[57e500ef5000+9707000]
2018-10-17T08:53:37.284401-05:00 INFO session_manager[1024]: [INFO:session_manager_service.cc(297)] Browser process 3836 exited with signal 4 (Illegal instruction)


Steps to reproduce: 
1. Update Lenovo N22
2. Enroll
3. Login

Current Behavior / Reproduction: 
Device crashes, restart, crashes, restarts

Expected Behavior: 
Device works

Drive link to logs: 
Crashes - 
https://drive.google.com/open?id=1oa8U5QkYqtnLdsOmOeDfS8NPYvhiKDiO
Video - 
https://drive.google.com/open?id=10YhnpG1tdEZsUxjlU2WPPBSRCrJJsSJQ
Debug logs folder - 
https://drive.google.com/open?id=1yw4YuR1xteZOKR6V_UVo5GZJ8WVrz-QY
 
The customer at 17197509 reports that after he changed the proxy settings, the device is no longer crashing. I'll proceed with asking for more details but for now, JSON with policies can be found at https://drive.google.com/file/d/1X_GA5BaDRd7ZE22PdjKC6Irn-sch_ZYo/view?usp=sharing
Components: -UI -Blink UI>Shell>Networking Enterprise
Labels: Enterprise-Triaged
Owner: marcuskoehler@chromium.org
Cc: poromov@chromium.org
poromov, please assign for reproduction/bugfixing
Cc: marcuskoehler@chromium.org
Owner: kirtika@chromium.org
Looks like it might be related to network stack as changing proxy settings resolved it and also there were these errors in the stack:

2018-10-17T09:30:58.403725-05:00 ERR shill[1023]: RTNETLINK answers: No such file or directory
2018-10-17T09:30:58.403862-05:00 ERR shill[1023]: Command failed -:1
2018-10-17T09:30:58.404026-05:00 ERR shill[1023]: RTNETLINK answers: No such file or directory
2018-10-17T09:30:58.404109-05:00 ERR shill[1023]: Command failed -:2
2018-10-17T09:30:58.404685-05:00 ERR shill[1016]: [ERROR:error.cc(138)] [throttler.cc(313)]: disabling throttle failed: 1
2018-10-17T09:30:58.404722-05:00 ERR shill[1016]: [ERROR:error.cc(138)] [throttler.cc(120)]: 

Could it be similar to https://crbug.com/706962 ?
Kirtika, could you have a look?
Owner: atwilson@chromium.org
Routing to Drew to take a look at it first.
#c5 : the throttle warnings are benign and unrelated. 
bandwidth throttling is not being used here and also has nothing to do with proxy settings. 

Cc: hendrich@chromium.org
Labels: -Pri-2 Pri-1
Owner: poromov@chromium.org
Raising priority due to crash. ppaz: Can we find out what policies were set that make it crash? The post-crash policies aren't that useful, and I can't see details of the troublesome proxy settings from the screenshots.
Cc: marchuk@google.com
++ case 17372255

Same Stable Signature00000f7e-exit2-ui, so I attached this signature to this bug.
69.0.3497.120 coral

2018-10-31T14:34:22.806323-04:00 WARNING crash_reporter[14505]: [user] Received crash notification for chrome[14253] sig 4, user 1000 (ignoring call by kernel - chrome crash; waiting for chrome to call us directly)
2018-10-31T14:34:22.916642-04:00 INFO session_manager[13663]: [INFO:session_manager_service.cc(297)] Browser process 14253 exited with signal 4 (Illegal instruction)
2018-10-31T14:34:22.917030-04:00 INFO session_manager[13663]: [INFO:browser_job.cc(157)] Terminating process group for browser 14253 with signal 9: Ensuring browser processes are gone.


More logs and crashes:
https://drive.google.com/open?id=1PeqOvEJD2ew1V1y3fZkroG-jJcD6dHAk

Server crash ID:
810001ebda16273e
5dc00dc31ab59d2b

Cannot collect policy, because it immediately crashes upon login and goes back to sign-in screen.
I had a quick look at the logs and couldn't find anything obvious. Any policies to repro this on our side would be very helpful.
Owner: ppaz@google.com
@ppaz + marchuk + vkhabarov:
1) Any info about policy settings would be helpful here (e.g. bad policy with M68). 
2) Do the other crashes also get resolved with different proxy settings?
Initial reporter case was closed, as it was fixed for the customer. What they did to fix was changing User Settings> Network >Proxy Settings in Admin Console from "Always auto detect" to "Allow user to configure". So -
1. Always auto detect causes crashes for them (reliably)
2. Allow user to configure - no crashes.
I wasn't able to reproduce this on a reks device with M69 or M72 with either proxy settings.
It confirms that there is a crash somewhere in network stack when proxy auto detect is configured. However, it looks like it's reproduced not in 100% cases, but when there is some special proxy configuration in the network (which Chrome OS is trying to auto-detect).

Victor, could you please ask the customer to share their real proxy configuration in the network?
Cc: dlaz@chromium.org
We just saw ~400 panther VC devices inside google with a possibly similar issue: 

crash/4a407f0cc8ef7928
crash/bd52f531ecde6222
https://listnr.corp.google.com/report/85832510435

crash/ autolinked to this bug, but it's hard for me to tell if it's the same issue.  If anyone has insight into whether the linked crashes are the same as this, or how to go about investigating, it would be very helpful.
Hello Team,

Do we have any update for this bug? 

Thanks!
Status: Assigned (was: Untriaged)
This issue has an owner, a component and a priority, but is still listed as untriaged or unconfirmed. By definition, this bug is triaged. Changing status to "assigned". Please reach out to me if you disagree with how I've done this.

Sign in to add a comment