-
Notifications
You must be signed in to change notification settings - Fork 420
Open
Labels
bugSomething isn't workingSomething isn't working
Description
Bug Report
System monitor is failing to load on Ubuntu 18.04 with kernel 5.4.0.42-generic.
Note:- The issue persists for this particular kernel version only
R0_rw=map_value_or_null(id=25,off=0,ks=4,vs=4,imm=0) R6_w=invP0 R7_r=invP0 R8_r=invP(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_r=map_value(id=0,off=0,ks=4,vs=32768,imm=0) R10=fp0 fp-8=mmmm0??? fp-16=mmmmmmmm fp-24_r=mmmmmmmm fp-32=mmmmmmmm fp-40_r=mmmmmmm0 fp-48=mmmmmmmm fp-56=???m???? fp-64=????mmmm fp-80=mmmmmmmm fp-88_r=mmmmmmmm fp-96=???????m fp-104=00000000 fp-112=mmmmmmmm fp-120=mmmmmmmm fp-128=mmmmmmmm fp-136=mmmmmmmm fp-144=mmmmmmmm fp-152=mmmmmmmm fp-160=mmmmmmmm fp-168=mmmmmmmm fp-176=mmmmmmmm fp-184=mmmmmmmm fp-192=mmmmmmmm fp-200=mmmmmmmm fp-208=mmmmmmmm fp-216=mmmmmmmm fp-224=mmmmmmmm fp-232=mmmmmmmm fp-240=mmmmmmmm fp-248=mmmmmmmm fp-256=mmmmmmmm fp-264=mmmmmmmm fp-272=mmmmmmmm fp-280=mmmmmmmm fp-288=mmmmmmmm fp-296=mmmmmmmm fp-304_r=mmmmmmmm fp-312=00000000 fp-320=mmmmmmmm fp-328=mmmmmmmm fp-336=mmmmmmmm fp-344=mmmmmmmm fp-352=mmmmmmmm fp-360=mmmmmmmm fp-368=mmmmmmmm fp-376=mmmmmmmm fp-384_r=ctx fp-392=map_value fp-400=fp fp-408=fp fp-416=mmmmmmmm fp-424=map_value
parent didn't have regs=100 stack=0 marks
last_idx 6385 first_idx 6372
regs=100 stack=0 before 6385: (85) call bpf_map_lookup_elem#1
regs=100 stack=0 before 6383: (18) r1 = 0xffffa0f2d554b600
regs=100 stack=0 before 6382: (07) r2 += -88
regs=100 stack=0 before 6381: (bf) r2 = r10
regs=100 stack=0 before 6380: (63) *(u32 *)(r10 -88) = r6
regs=100 stack=0 before 6379: (63) *(u32 *)(r10 -16) = r1
regs=100 stack=0 before 6378: (b4) w1 = 30
regs=100 stack=0 before 6377: (63) *(u32 *)(r0 +0) = r1
regs=100 stack=0 before 6376: (04) w1 += 1
regs=100 stack=0 before 6375: (bc) w1 = w8
regs=100 stack=0 before 6374: (73) *(u8 *)(r10 -40) = r6
regs=100 stack=0 before 6373: (b4) w6 = 0
regs=100 stack=0 before 6372: (26) if w1 > 0x7ffe goto pc+69
R0_rw=map_value(id=0,off=0,ks=4,vs=4,imm=0) R1_rw=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R6=inv1 R7_rw=invP0 R8_rw=invP(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_r=map_value(id=0,off=0,ks=4,vs=32768,imm=0) R10=fp0 fp-8=mmmm0??? fp-16=mmmmmmmm fp-24_r=mmmmmmmm fp-32=mmmmmmmm fp-40_r=mmmmmmmm fp-48=mmmmmmmm fp-56=???m???? fp-64=????mmmm fp-80=mmmmmmmm fp-88_r=mmmmmmmm fp-96=???????m fp-104=00000000 fp-112=mmmmmmmm fp-120=mmmmmmmm fp-128=mmmmmmmm fp-136=mmmmmmmm fp-144=mmmmmmmm fp-152=mmmmmmmm fp-160=mmmmmmmm fp-168=mmmmmmmm fp-176=mmmmmmmm fp-184=mmmmmmmm fp-192=mmmmmmmm fp-200=mmmmmmmm fp-208=mmmmmmmm fp-216=mmmmmmmm fp-224=mmmmmmmm fp-232=mmmmmmmm fp-240=mmmmmmmm fp-248=mmmmmmmm fp-256=mmmmmmmm fp-264=mmmmmmmm fp-272=mmmmmmmm fp-280=mmmmmmmm fp-288=mmmmmmmm fp-296=mmmmmmmm fp-304_r=mmmmmmmm fp-312=00000000 fp-320=mmmmmmmm fp-328=mmmmmmmm fp-336=mmmmmmmm fp-344=mmmmmmmm fp-352=mmmmmmmm fp-360=mmmmmmmm fp-368=mmmmmmmm fp-376=mmmmmmmm fp-384_r=ctx fp-392=map_value fp-400=fp fp-408=fp fp-416=mmmmmmmm fp-424=map_value
parent didn't have regs=100 stack=0 marks
last_idx 6371 first_idx 6361
regs=100 stack=0 before 6371: (04) w1 += -1
regs=100 stack=0 before 6370: (bc) w1 = w8
regs=100 stack=0 before 6369: (61) r8 = *(u32 *)(r0 +0)
6437: (bf) r3 = r10
6438: (07) r3 += -40
; if (bpf_probe_read(&(bufs_p->buf[num_of_hashes_idx]), sizeof(num_of_hashes), &num_of_hashes) != 0)
6439: (bf) r1 = r9
6440: (b4) w2 = 1
6441: (85) call bpf_probe_read#4
R0=inv(id=0,umax_value=9223372036854775807,var_off=(0x0; 0x7fffffffffffffff)) R1_w=map_value(id=0,off=0,ks=4,vs=32768,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R2_w=inv1 R3_w=fp-40 R6=invP0 R7=invP0 R8=invP(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_w=map_value(id=0,off=0,ks=4,vs=32768,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 fp-8=mmmm0??? fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=???m???? fp-64=????mmmm fp-80=mmmmmmmm fp-88=mmmmmmmm fp-96=???????m fp-104=00000000 fp-112=mmmmmmmm fp-120=mmmmmmmm fp-128=mmmmmmmm fp-136=mmmmmmmm fp-144=mmmmmmmm fp-152=mmmmmmmm fp-160=mmmmmmmm fp-168=mmmmmmmm fp-176=mmmmmmmm fp-184=mmmmmmmm fp-192=mmmmmmmm fp-200=mmmmmmmm fp-208=mmmmmmmm fp-216=mmmmmmmm fp-224=mmmmmmmm fp-232=mmmmmmmm fp-240=mmmmmmmm fp-248=mmmmmmmm fp-256=mmmmmmmm fp-264=mmmmmmmm fp-272=mmmmmmmm fp-280=mmmmmmmm fp-288=mmmmmmmm fp-296=mmmmmmmm fp-304=mmmmmmmm fp-312=00000000 fp-320=mmmmmmmm fp-328=mmmmmmmm fp-336=mmmmmmmm fp-344=mmmmmmmm fp-352=mmmmmmmm fp-360=mmmmmmmm fp-368=mmmmmmmm fp-376=mmmmmmmm fp-384=ctx fp-392=map_value fp-400=fp fp-408=fp fp-416=mmmmmmmm fp-424=map_value
R1 unbounded memory access, make sure to bounds check any array access into a map
processed 2894 insns (limit 1000000) max_states_per_insn 0 total_states 273 peak_states 273 mark_read 251
2025-11-18 04:55:49.981668 ERROR Failed to initialize BPF (bpf module is nil program kretprobe__fchownat: load program: permission denied: R0=inv(id=0,umax_value=9223372036854775807,var_off=(0x0; 0x7fffffffffffffff)) R1_w=map_value(id=0,off=0,ks=4,vs=32768,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R2_w=inv1 R3_w=fp-40 R6=invP0 R7=invP0 R8=invP(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R9_w=map_value(id=0,off=0,ks=4,vs=32768,umax_value=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 fp-8=mmmm0??? fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=???m???? fp-64=????mmmm fp-80=mmmmmmmm fp-88=mmmmmmmm fp-96=???????m fp-104=00000000 fp-112=mmmmmmmm fp-120=mmmmmmmm fp-128=mmmmmmmm fp-136=mmmmmmmm fp-144=mmmmmmmm fp-152=mmmmmmmm fp-160=mmmmmmmm fp-168=mmmmmmmm fp-176=mmmmmmmm fp-184=mmmmmmmm fp-192=mmmmmmmm fp-200=mmmmmmmm fp-208=mmmmmmmm fp-216=mmmmmmmm fp-224=mmmmmmmm fp-232=mmmmmmmm fp-240=mmmmmmmm fp-248=mmmmmmmm fp-256=mmmmmmmm fp-264=mmmmmmmm fp-272=mmmmmmmm fp-280=mmmmmmmm fp-288=mmmmmmmm fp-296=mmmmmmmm fp-304=mmmmmmmm fp-312=00000000 fp-320=mmmmmmmm fp-328=mmmmmmmm fp-336=mmmmmmmm fp-344=mmmmmmmm fp-352=mmmmmmmm fp-360=mmmmmmmm fp-368=mmmmmmmm fp-376=mmmmmmmm fp-384=ctx fp-392=map_value fp-400=fp fp-408=fp fp-416=mmmmmmmm fp-424=map_value: R1 unbounded memory access, make sure to bounds check any array access into a map (9391 line(s) omitted))
github.com/kubearmor/KubeArmor/KubeArmor/log.Errf
General Information
- Environment description (GKE, VM-Kubeadm, vagrant-dev-env, minikube, microk8s, ...)
- Kernel version (run
uname -a) - Orchestration system version in use (e.g.
kubectl version, ...) - Link to relevant artifacts (policies, deployments scripts, ...)
- Target containers/pods
To Reproduce
- Instruction 1
- Instruction 2
Expected behavior
A description of what you expected to happen.
Screenshots
If applicable, add screenshots to help explain your problem.
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working