Your message dated Fri, 18 Apr 2025 13:27:08 +0800
with message-id <7fc292a13e6543f701e6c7640f972cd81227fc30.ca...@debian.org>
and subject line Re: opensnitch-ebpf-modules: causes opensnitch daemon to crash 
(SIGSEGV)
has caused the Debian Bug report #1037282,
regarding opensnitch-ebpf-modules: causes opensnitch daemon to crash (SIGSEGV)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1037282: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037282
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: opensnitch-ebpf-modules
Version: 1.5.9-1
Severity: important
Usertags: crash
Control: found -1 1.5.9-2

When starting the opensnitch service while opensnitch-ebpf-modules is
installed, the opensnitch daemon crashes with the SIGSEGV error below.

This does not happen with the eBPF modules not installed and proc used.

I didn't provide a full backtrace because I'm not familiar with how to
get Golang programs to do a core dump nor how to get a backtrace.

   Jun 10 13:14:30 systemd[1]: Starting opensnitch.service - OpenSnitch is a 
GNU/Linux application firewall....
   Jun 10 13:14:30 systemd[1]: Started opensnitch.service - OpenSnitch is a 
GNU/Linux application firewall..
   Jun 10 13:14:30 opensnitchd[3782650]: [2023-06-10 05:14:30]  IMP  Starting 
opensnitch-daemon v1.5.9
   Jun 10 13:14:30 opensnitchd[3782650]: [2023-06-10 05:14:30]  INF  Loading 
rules from /etc/opensnitchd/rules ...
   Jun 10 13:14:30 opensnitchd[3782650]: panic: runtime error: invalid memory 
address or nil pointer dereference
   Jun 10 13:14:30 opensnitchd[3782650]: [signal SIGSEGV: segmentation 
violation code=0x1 addr=0x10 pc=0x5a37ac]
   Jun 10 13:14:30 opensnitchd[3782650]: goroutine 1 [running]:
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/iovisor/gobpf/elf.(*Module).UpdateElement.func1(0x7f3faf601d08?, 
0x0?, 0x7f3fd7c18108?, 0x10?, 0xc000058800?)
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/iovisor/gobpf/elf/table.go:75 +0x2c
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/iovisor/gobpf/elf.(*Module).UpdateElement(0xc00016a000?, 0xc?, 
0x97e195?, 0xa?, 0x62?)
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/iovisor/gobpf/elf/table.go:80 +0x59
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/procmon/ebpf.Start()
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/procmon/ebpf/ebpf.go:95 +0x4a5
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/procmon/monitor.Init()
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/procmon/monitor/init.go:55 +0x53
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/procmon/monitor.ReconfigureMonitorMethod({0xc0001b26e4,
 0x4})
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/procmon/monitor/init.go:29 +0x6c
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/ui.(*Client).loadConfiguration(0xc0001b19e0,
 {0xc0004a2a00, 0x169, 0x200})
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/ui/config.go:100 +0x285
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/ui.(*Client).loadDiskConfiguration(0xc0001b19e0,
 0x0)
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/ui/config.go:52 +0x10a
   Jun 10 13:14:30 opensnitchd[3782650]: 
github.com/evilsocket/opensnitch/daemon/ui.NewClient({0x0, 0x0}, 0xc00070ea90, 
0xc00011a5a0)
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/ui/client.go:82 +0x114
   Jun 10 13:14:30 opensnitchd[3782650]: main.main()
   Jun 10 13:14:30 opensnitchd[3782650]:         
github.com/evilsocket/opensnitch/daemon/main.go:382 +0x62f
   Jun 10 13:14:30 systemd[1]: opensnitch.service: Main process exited, 
code=exited, status=2/INVALIDARGUMENT
   Jun 10 13:14:30 systemd[1]: opensnitch.service: Failed with result 
'exit-code'.

-- System Information:
Debian Release: 12.0
  APT prefers testing-security
  APT policy: (950, 'testing-security'), (900, 'testing-debug'), (900, 
'testing'), (860, 'testing-proposed-updates-debug'), (860, 
'testing-proposed-updates'), (850, 'buildd-testing-proposed-updates'), (800, 
'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 
'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental')
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-9-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

opensnitch-ebpf-modules depends on no packages.

opensnitch-ebpf-modules recommends no packages.

Versions of packages opensnitch-ebpf-modules suggests:
ii  opensnitch  1.5.9-2

-- 
bye,
pabs

https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---
--- Begin Message ---
Source: opensnitch
Source-Version: 1.6.5.1-1

On Thu, 17 Apr 2025 14:52:12 +0200 Petter Reinholdtsen wrote:

> Can you test the new upstream version in experimental (or build from
> the salsa git repo), and let me know if you still see this segfault?

This was indeed fixed a long time ago in upstream version 1.6.5.1.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

Reply via email to