-
Notifications
You must be signed in to change notification settings - Fork 269
Open
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.
Milestone
Description
What steps did you take and what happened:
We use trivy operator to scan various images in our clusters. We also use Kubernetes Dashboard. Whe there is scanning of image called clear-stale-pid. It ends with the following error if the trivy scanner.
SIGQUIT: quit
PC=0x4deef9 m=0 sigcode=0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 6389 gp=0xc000b29500 m=0 mp=0x8214060 [running]:
bytes.ToLower({0xc0024e4000, 0x65adc, 0x7?})
/opt/hostedtoolcache/go/1.22.9/x64/src/bytes/bytes.go:679 +0x139 fp=0xc0016eb228 sp=0xc0016eb1d8 pc=0x4deef9
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Rule).MatchKeywords(0xc0016eb5e8, {0xc0024e4000?, 0x2?, 0xc00141c661?})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:178 +0x38 fp=0xc0016eb2b0 sp=0xc0016eb228 pc=0x37ad0b8
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).Scan(0xc0003ac3a0, {{0xc00141c661, 0x2a}, {0xc0024e4000, 0x65adc, 0x66000}, 0x0})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:409 +0x58a fp=0xc0016ebba8 sp=0xc0016eb2b0 pc=0x37aed0a
github.com/aquasecurity/trivy/pkg/fanal/analyzer/secret.(*SecretAnalyzer).Analyze(0xc0003ac3a0, {0x58f3120?, 0xc0003f3730?}, {{0x7fffe5683c2d, 0x1}, {0xc00141c661, 0x2a}, {0x5900688, 0xc0007f2ea0}, {0x58e2b60, ...}, ...})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/secret/secret.go:137 +0x4f5 fp=0xc0016ebe00 sp=0xc0016ebba8 pc=0x386e515
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.func1({0x58f6010?, 0xc0003ac3a0}, {0x58f3708?, 0xc0011600c8?})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:439 +0x245 fp=0xc0016ebfb0 sp=0xc0016ebe00 pc=0x2cf2e85
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.gowrap1()
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:451 +0x30 fp=0xc0016ebfe0 sp=0xc0016ebfb0 pc=0x2cf2c10
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0016ebfe8 sp=0xc0016ebfe0 pc=0x479be1
created by github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile in goroutine 1
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:434 +0x4d0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 1 gp=0xc000006380 m=nil [select]:
runtime.gopark(0xc001dc1240?, 0x2?, 0xf8?, 0xad?, 0xc001dc1204?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc001dc10b0 sp=0xc001dc1090 pc=0x44232e
runtime.selectgo(0xc001dc1240, 0xc001dc1200, 0xc001144840?, 0x0, 0x1?, 0x1)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/select.go:327 +0x725 fp=0xc001dc11d0 sp=0xc001dc10b0 pc=0x454105
golang.org/x/sync/semaphore.(*Weighted).Acquire(0xc000e100f0, {0x58f3120, 0xc0003f3730}, 0x1)
/home/runner/go/pkg/mod/golang.org/x/sync@v0.9.0/semaphore/semaphore.go:74 +0x334 fp=0xc001dc1280 sp=0xc001dc11d0 pc=0x90bed4
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile({0xc0008f44e0, {0xc000bb8200, 0x1e, 0x20}, {0xc000da4200, 0x6, 0x8}, 0xc000e12c00, {0x47ad91d, 0x7}}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:429 +0x2b1 fp=0xc001dc1410 sp=0xc001dc1280 pc=0x2cf26b1
github.com/aquasecurity/trivy/pkg/fanal/artifact/local.Artifact.Inspect.func1({0xc001144841?, 0x21?}, {0x5900688, 0xc000c44750}, 0xc0008300f0)
/home/runner/work/trivy/trivy/pkg/fanal/artifact/local/fs.go:96 +0x138 fp=0xc001dc1598 sp=0xc001dc1410 pc=0x36e6958
github.com/aquasecurity/trivy/pkg/fanal/walker.(*FS).Walk.(*FS).WalkDirFunc.func1({0xc001144840, 0x21}, {0x58f31c8, 0xc000087840}, {0x0?, 0x0?})
/home/runner/work/trivy/trivy/pkg/fanal/walker/fs.go:72 +0x26c fp=0xc001dc1638 sp=0xc001dc1598 pc=0x2d4f4ac
github.com/aquasecurity/trivy/pkg/fanal/walker.(*FS).Walk.(*FS).onError.func2({0xc001144840, 0x21}, {0x58f31c8?, 0xc000087840?}, {0x0?, 0x0?})
/home/runner/work/trivy/trivy/pkg/fanal/walker/fs.go:82 +0x46 fp=0xc001dc16a8 sp=0xc001dc1638 pc=0x2d4f106
path/filepath.walkDir({0xc001144840, 0x21}, {0x58f31c8, 0xc000087840}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:443 +0x50 fp=0xc001dc1768 sp=0xc001dc16a8 pc=0x5de490
path/filepath.walkDir({0xc001412000, 0x12}, {0x58f31c8, 0xc000c19b00}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:465 +0x285 fp=0xc001dc1828 sp=0xc001dc1768 pc=0x5de6c5
path/filepath.walkDir({0xc001418d30, 0xd}, {0x58f31c8, 0xc000c19640}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:465 +0x285 fp=0xc001dc18e8 sp=0xc001dc1828 pc=0x5de6c5
path/filepath.walkDir({0xc001418ca8, 0x8}, {0x58f31c8, 0xc000cb4a80}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:465 +0x285 fp=0xc001dc19a8 sp=0xc001dc18e8 pc=0x5de6c5
path/filepath.walkDir({0xc0018026b8, 0x4}, {0x58f31c8, 0xc000cf8ec0}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:465 +0x285 fp=0xc001dc1a68 sp=0xc001dc19a8 pc=0x5de6c5
path/filepath.walkDir({0x7fffe5683c2d, 0x1}, {0x58f32e0, 0xc0003a9170}, 0xc001dc1c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:465 +0x285 fp=0xc001dc1b28 sp=0xc001dc1a68 pc=0x5de6c5
path/filepath.WalkDir({0x7fffe5683c2d, 0x1}, 0xc0013f5c00)
/opt/hostedtoolcache/go/1.22.9/x64/src/path/filepath/path.go:533 +0x7b fp=0xc001dc1b88 sp=0xc001dc1b28 pc=0x5deb1b
github.com/aquasecurity/trivy/pkg/fanal/walker.(*FS).Walk(0x827fc80, {0x7fffe5683c2d, 0x1}, {{0x827fc80, 0x0, 0x0}, {0xc000cf8940, 0x4, 0x4}}, 0xc000e10140)
/home/runner/work/trivy/trivy/pkg/fanal/walker/fs.go:34 +0x266 fp=0xc001dc1c80 sp=0xc001dc1b88 pc=0x2d4efe6
github.com/aquasecurity/trivy/pkg/fanal/artifact/local.Artifact.Inspect({{0x7fffe5683c2d, 0x1}, {0x7f2dc3726b18, 0xc000cf8000}, {0x58b11e0, 0x827fc80}, {0xc0008f44e0, {0xc000bb8200, 0x1e, 0x20}, ...}, ...}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/artifact/local/fs.go:87 +0x39d fp=0xc001dc2480 sp=0xc001dc1c80 pc=0x36e5efd
github.com/aquasecurity/trivy/pkg/fanal/artifact/local.(*Artifact).Inspect(_, {_, _})
<autogenerated>:1 +0xea fp=0xc001dc3310 sp=0xc001dc2480 pc=0x36e71aa
github.com/aquasecurity/trivy/pkg/scanner.Scanner.ScanArtifact({{_, _}, {_, _}}, {_, _}, {{0xc0000cbc60, 0x2, 0x2}, {0xc000aa8080, ...}, ...})
/home/runner/work/trivy/trivy/pkg/scanner/scan.go:156 +0x103 fp=0xc001dc3e00 sp=0xc001dc3310 pc=0x38769e3
github.com/aquasecurity/trivy/pkg/commands/artifact.(*runner).scan(_, {_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, ...}, ...}, ...)
/home/runner/work/trivy/trivy/pkg/commands/artifact/run.go:620 +0x32b fp=0xc001dc5e28 sp=0xc001dc3e00 pc=0x387d94b
github.com/aquasecurity/trivy/pkg/commands/artifact.(*runner).scanArtifact(_, {_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, ...}, ...}, ...)
/home/runner/work/trivy/trivy/pkg/commands/artifact/run.go:259 +0xb1 fp=0xc001dc6ba0 sp=0xc001dc5e28 pc=0x3878f51
github.com/aquasecurity/trivy/pkg/commands/artifact.(*runner).scanFS(_, {_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, ...}, ...})
/home/runner/work/trivy/trivy/pkg/commands/artifact/run.go:204 +0xc5 fp=0xc001dc7908 sp=0xc001dc6ba0 pc=0x3878785
github.com/aquasecurity/trivy/pkg/commands/artifact.(*runner).ScanRootfs(_, {_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, ...}, ...})
/home/runner/work/trivy/trivy/pkg/commands/artifact/run.go:191 +0x19d fp=0xc001dc8680 sp=0xc001dc7908 pc=0x38785fd
github.com/aquasecurity/trivy/pkg/commands/artifact.Runner.ScanRootfs-fm({_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, {0x7fffe5683bcc, ...}, ...}, ...})
<autogenerated>:1 +0xc8 fp=0xc001dc93e0 sp=0xc001dc8680 pc=0x3882d68
github.com/aquasecurity/trivy/pkg/commands/artifact.Run({_, _}, {{{0x47c4a2d, 0xa}, 0x0, 0x1, 0x0, 0x1, 0x45d964b800, {0x7fffe5683bcc, ...}, ...}, ...}, ...)
/home/runner/work/trivy/trivy/pkg/commands/artifact/run.go:385 +0x8cb fp=0xc001dcac00 sp=0xc001dc93e0 pc=0x387a48b
github.com/aquasecurity/trivy/pkg/commands.NewRootfsCommand.func2(0xc000c6e608, {0xc000ff3220, 0x1, 0xa})
/home/runner/work/trivy/trivy/pkg/commands/app.go:445 +0x19c fp=0xc001dcbb98 sp=0xc001dcac00 pc=0x39898fc
github.com/spf13/cobra.(*Command).execute(0xc000c6e608, {0xc000ff30e0, 0xa, 0xa})
/home/runner/go/pkg/mod/github.com/spf13/cobra@v1.8.1/command.go:985 +0xaca fp=0xc001dcbd20 sp=0xc001dcbb98 pc=0x614a6a
github.com/spf13/cobra.(*Command).ExecuteC(0xc000857508)
/home/runner/go/pkg/mod/github.com/spf13/cobra@v1.8.1/command.go:1117 +0x3ff fp=0xc001dcbdf8 sp=0xc001dcbd20 pc=0x61533f
github.com/spf13/cobra.(*Command).Execute(0x48176bb?)
/home/runner/go/pkg/mod/github.com/spf13/cobra@v1.8.1/command.go:1041 +0x13 fp=0xc001dcbe10 sp=0xc001dcbdf8 pc=0x614e93
main.run()
/home/runner/work/trivy/trivy/cmd/trivy/main.go:39 +0x113 fp=0xc001dcbea0 sp=0xc001dcbe10 pc=0x3b84593
main.main()
/home/runner/work/trivy/trivy/cmd/trivy/main.go:19 +0x1f fp=0xc001dcbf50 sp=0xc001dcbea0 pc=0x3b8431f
runtime.main()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:271 +0x29d fp=0xc001dcbfe0 sp=0xc001dcbf50 pc=0x441edd
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc001dcbfe8 sp=0xc001dcbfe0 pc=0x479be1
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 2 gp=0xc0000068c0 m=nil [force gc (idle), 4 minutes]:
runtime.gopark(0x22ab3a08ad954a?, 0x0?, 0x0?, 0x0?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a8fa8 sp=0xc0000a8f88 pc=0x44232e
runtime.goparkunlock(...)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:408
runtime.forcegchelper()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:326 +0xb3 fp=0xc0000a8fe0 sp=0xc0000a8fa8 pc=0x442193
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a8fe8 sp=0xc0000a8fe0 pc=0x479be1
created by runtime.init.6 in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:314 +0x1a
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 3 gp=0xc000006e00 m=nil [GC sweep wait]:
runtime.gopark(0x8203901?, 0x0?, 0x0?, 0x0?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a9780 sp=0xc0000a9760 pc=0x44232e
runtime.goparkunlock(...)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:408
runtime.bgsweep(0xc0000c8000)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgcsweep.go:318 +0xdf fp=0xc0000a97c8 sp=0xc0000a9780 pc=0x42b07f
runtime.gcenable.gowrap1()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:203 +0x25 fp=0xc0000a97e0 sp=0xc0000a97c8 pc=0x41f985
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a97e8 sp=0xc0000a97e0 pc=0x479be1
created by runtime.gcenable in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:203 +0x66
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 4 gp=0xc000006fc0 m=nil [GC scavenge wait]:
runtime.gopark(0xba19ecb?, 0x3ca67d40?, 0x0?, 0x0?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a9f78 sp=0xc0000a9f58 pc=0x44232e
runtime.goparkunlock(...)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:408
runtime.(*scavengerState).park(0x820fb20)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc0000a9fa8 sp=0xc0000a9f78 pc=0x428a29
runtime.bgscavenge(0xc0000c8000)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc0000a9fc8 sp=0xc0000a9fa8 pc=0x428fd9
runtime.gcenable.gowrap2()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:204 +0x25 fp=0xc0000a9fe0 sp=0xc0000a9fc8 pc=0x41f925
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a9fe8 sp=0xc0000a9fe0 pc=0x479be1
created by runtime.gcenable in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:204 +0xa5
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 17 gp=0xc000102540 m=nil [finalizer wait, 4 minutes]:
runtime.gopark(0xc0000a8660?, 0x427efc?, 0xc0?, 0x51?, 0x550011?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a8620 sp=0xc0000a8600 pc=0x44232e
runtime.runfinq()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mfinal.go:194 +0x107 fp=0xc0000a87e0 sp=0xc0000a8620 pc=0x41e9c7
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a87e8 sp=0xc0000a87e0 pc=0x479be1
created by runtime.createfing in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mfinal.go:164 +0x3d
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 18 gp=0xc000452000 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab5e3b83827d?, 0x1?, 0xd8?, 0xfe?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a4750 sp=0xc0000a4730 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0000a47e0 sp=0xc0000a4750 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a47e8 sp=0xc0000a47e0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 19 gp=0xc0004521c0 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab61c5e73ff4?, 0x3?, 0x6c?, 0x87?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a4f50 sp=0xc0000a4f30 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0000a4fe0 sp=0xc0000a4f50 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a4fe8 sp=0xc0000a4fe0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 33 gp=0xc0004c2000 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab61c614c244?, 0x1?, 0xbb?, 0xb?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0004c8750 sp=0xc0004c8730 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c87e0 sp=0xc0004c8750 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c87e8 sp=0xc0004c87e0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 34 gp=0xc0004c21c0 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab610ca9eff7?, 0x1?, 0xec?, 0x2c?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0004c8f50 sp=0xc0004c8f30 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c8fe0 sp=0xc0004c8f50 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c8fe8 sp=0xc0004c8fe0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 20 gp=0xc000452380 m=nil [GC worker (idle)]:
runtime.gopark(0x82851c0?, 0x3?, 0x5d?, 0x98?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a5750 sp=0xc0000a5730 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0000a57e0 sp=0xc0000a5750 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a57e8 sp=0xc0000a57e0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 35 gp=0xc0004c2380 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab61c5e7c1a4?, 0x1?, 0xac?, 0x51?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0004c9750 sp=0xc0004c9730 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0004c97e0 sp=0xc0004c9750 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c97e8 sp=0xc0004c97e0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 5 gp=0xc000007500 m=nil [GC worker (idle)]:
runtime.gopark(0x22ab61c5e72c47?, 0x1?, 0x4a?, 0x8a?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000aa750 sp=0xc0000aa730 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0000aa7e0 sp=0xc0000aa750 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000aa7e8 sp=0xc0000aa7e0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 21 gp=0xc000452540 m=nil [GC worker (idle)]:
runtime.gopark(0x82851c0?, 0x1?, 0x6e?, 0x2d?, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0000a5f50 sp=0xc0000a5f30 pc=0x44232e
runtime.gcBgMarkWorker()
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1310 +0xe5 fp=0xc0000a5fe0 sp=0xc0000a5f50 pc=0x421a65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000a5fe8 sp=0xc0000a5fe0 pc=0x479be1
created by runtime.gcBgMarkStartWorkers in goroutine 1
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/mgc.go:1234 +0x1c
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 22 gp=0xc0004c3880 m=nil [select]:
runtime.gopark(0xc0004cbf78?, 0x3?, 0x8?, 0x81?, 0xc0004cbf72?)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/proc.go:402 +0xce fp=0xc0004cbe18 sp=0xc0004cbdf8 pc=0x44232e
runtime.selectgo(0xc0004cbf78, 0xc0004cbf6c, 0xc000946b00?, 0x0, 0x0?, 0x1)
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/select.go:327 +0x725 fp=0xc0004cbf38 sp=0xc0004cbe18 pc=0x454105
go.opencensus.io/stats/view.(*worker).start(0xc000946b00)
/home/runner/go/pkg/mod/go.opencensus.io@v0.24.0/stats/view/worker.go:292 +0x9f fp=0xc0004cbfc8 sp=0xc0004cbf38 pc=0x1670aff
go.opencensus.io/stats/view.init.0.gowrap1()
/home/runner/go/pkg/mod/go.opencensus.io@v0.24.0/stats/view/worker.go:34 +0x25 fp=0xc0004cbfe0 sp=0xc0004cbfc8 pc=0x166fe65
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004cbfe8 sp=0xc0004cbfe0 pc=0x479be1
created by go.opencensus.io/stats/view.init.0 in goroutine 1
/home/runner/go/pkg/mod/go.opencensus.io@v0.24.0/stats/view/worker.go:34 +0x8d
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 6501 gp=0xc000603500 m=nil [runnable]:
regexp.(*machine).add(0xc0016d0000, 0xc0016d0040, 0x1?, 0x3569, {0xc000974050, 0xa, 0xa}, 0xc000cf2da0, 0x0?)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:317 +0x525 fp=0xc000cf2d30 sp=0xc000cf2d28 pc=0x602c25
regexp.(*machine).match(0xc0016d0000, {0x58fb920, 0xc0016d00a8}, 0x0)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:222 +0x3a5 fp=0xc000cf2e00 sp=0xc000cf2d30 pc=0x601d85
regexp.(*Regexp).doExecute(0xc00067de00, {0x0, 0x0}, {0xc00248a000, 0x16c18, 0x18000}, {0x0, 0x0}, 0x0, 0xa, ...)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:542 +0x308 fp=0xc000cf2ea0 sp=0xc000cf2e00 pc=0x603948
regexp.(*Regexp).allMatches(0xc00067de00, {0x0, 0x0}, {0xc00248a000, 0x16c18, 0x18000}, 0x16c19, 0xc000cf2ff0)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/regexp.go:782 +0x131 fp=0xc000cf2f98 sp=0xc000cf2ea0 pc=0x609ab1
regexp.(*Regexp).FindAllSubmatchIndex(0x47dc925?, {0xc00248a000?, 0x7f2dc3000022?, 0xc001658f80?}, 0x41adf8?)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/regexp.go:1182 +0x66 fp=0xc000cf3010 sp=0xc000cf2f98 pc=0x60c4a6
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).FindSubmatchLocations(0xc0003ac3a0, {{0x47dc925, 0xb}, {0x47a0059, 0x3}, {0x47dc930, 0xb}, {0x479e8f5, 0x3}, 0x81f7d98, ...}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:130 +0x57 fp=0xc000cf3180 sp=0xc000cf3010 pc=0x37aca17
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).FindLocations(0xc0003ac3a0?, {{0x47dc925, 0xb}, {0x47a0059, 0x3}, {0x47dc930, 0xb}, {0x479e8f5, 0x3}, 0x81f7d98, ...}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:108 +0xdb fp=0xc000cf32b0 sp=0xc000cf3180 pc=0x37ac79b
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).Scan(0xc0003ac3a0, {{0xc001144451, 0x2b}, {0xc00248a000, 0x16c18, 0x18000}, 0x0})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:414 +0x605 fp=0xc000cf3ba8 sp=0xc000cf32b0 pc=0x37aed85
github.com/aquasecurity/trivy/pkg/fanal/analyzer/secret.(*SecretAnalyzer).Analyze(0xc0003ac3a0, {0x58f3120?, 0xc0003f3730?}, {{0x7fffe5683c2d, 0x1}, {0xc001144451, 0x2b}, {0x5900688, 0xc000f42680}, {0x58e2b60, ...}, ...})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/secret/secret.go:137 +0x4f5 fp=0xc000cf3e00 sp=0xc000cf3ba8 pc=0x386e515
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.func1({0x58f6010?, 0xc0003ac3a0}, {0x58f3708?, 0xc00013ca58?})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:439 +0x245 fp=0xc000cf3fb0 sp=0xc000cf3e00 pc=0x2cf2e85
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.gowrap1()
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:451 +0x30 fp=0xc000cf3fe0 sp=0xc000cf3fb0 pc=0x2cf2c10
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000cf3fe8 sp=0xc000cf3fe0 pc=0x479be1
created by github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile in goroutine 1
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:434 +0x4d0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 6357 gp=0xc000007c00 m=nil [runnable]:
regexp.(*machine).step(0xc0011021e0, 0xc001102220, 0xc0011021f0, 0xa611, 0xa612, 0x45, 0xc000e3cda0)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:260 +0x6dd fp=0xc000e3cd30 sp=0xc000e3cd28 pc=0x6026bd
regexp.(*machine).match(0xc0011021e0, {0x58fb920, 0xc001102288}, 0x0)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:225 +0x409 fp=0xc000e3ce00 sp=0xc000e3cd30 pc=0x601de9
regexp.(*Regexp).doExecute(0xc00067de00, {0x0, 0x0}, {0xc001e5e000, 0x47db4, 0x48000}, {0x0, 0x0}, 0x0, 0xa, ...)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/exec.go:542 +0x308 fp=0xc000e3cea0 sp=0xc000e3ce00 pc=0x603948
regexp.(*Regexp).allMatches(0xc00067de00, {0x0, 0x0}, {0xc001e5e000, 0x47db4, 0x48000}, 0x47db5, 0xc000e3cff0)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/regexp.go:782 +0x131 fp=0xc000e3cf98 sp=0xc000e3cea0 pc=0x609ab1
regexp.(*Regexp).FindAllSubmatchIndex(0x47dc925?, {0xc001e5e000?, 0x7f2dc3000022?, 0xc001b46940?}, 0x41adf8?)
/opt/hostedtoolcache/go/1.22.9/x64/src/regexp/regexp.go:1182 +0x66 fp=0xc000e3d010 sp=0xc000e3cf98 pc=0x60c4a6
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).FindSubmatchLocations(0xc0003ac3a0, {{0x47dc925, 0xb}, {0x47a0059, 0x3}, {0x47dc930, 0xb}, {0x479e8f5, 0x3}, 0x81f7d98, ...}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:130 +0x57 fp=0xc000e3d180 sp=0xc000e3d010 pc=0x37aca17
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).FindLocations(0xc0003ac3a0?, {{0x47dc925, 0xb}, {0x47a0059, 0x3}, {0x47dc930, 0xb}, {0x479e8f5, 0x3}, 0x81f7d98, ...}, ...)
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:108 +0xdb fp=0xc000e3d2b0 sp=0xc000e3d180 pc=0x37ac79b
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).Scan(0xc0003ac3a0, {{0xc000eefe01, 0x27}, {0xc001e5e000, 0x47db4, 0x48000}, 0x0})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:414 +0x605 fp=0xc000e3dba8 sp=0xc000e3d2b0 pc=0x37aed85
github.com/aquasecurity/trivy/pkg/fanal/analyzer/secret.(*SecretAnalyzer).Analyze(0xc0003ac3a0, {0x58f3120?, 0xc0003f3730?}, {{0x7fffe5683c2d, 0x1}, {0xc000eefe01, 0x27}, {0x5900688, 0xc000bfdba0}, {0x58e2b60, ...}, ...})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/secret/secret.go:137 +0x4f5 fp=0xc000e3de00 sp=0xc000e3dba8 pc=0x386e515
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.func1({0x58f6010?, 0xc0003ac3a0}, {0x58f3708?, 0xc001376100?})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:439 +0x245 fp=0xc000e3dfb0 sp=0xc000e3de00 pc=0x2cf2e85
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.gowrap1()
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:451 +0x30 fp=0xc000e3dfe0 sp=0xc000e3dfb0 pc=0x2cf2c10
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000e3dfe8 sp=0xc000e3dfe0 pc=0x479be1
created by github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile in goroutine 1
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:434 +0x4d0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 4980 gp=0xc000b29a40 m=nil [runnable]:
unicode.ToLower(0x20?)
/opt/hostedtoolcache/go/1.22.9/x64/src/unicode/letter.go:265 +0x55 fp=0xc001139158 sp=0xc001139150 pc=0x4dc075
bytes.Map(0x4f61fd0, {0xc003e66000, 0x5143cb, 0x516000})
/opt/hostedtoolcache/go/1.22.9/x64/src/bytes/bytes.go:562 +0x122 fp=0xc0011391d8 sp=0xc001139158 pc=0x4de942
bytes.ToLower({0xc003e66000?, 0x47b4446?, 0x7?})
/opt/hostedtoolcache/go/1.22.9/x64/src/bytes/bytes.go:683 +0x6c fp=0xc001139228 sp=0xc0011391d8 pc=0x4dee2c
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Rule).MatchKeywords(0xc0011395e8, {0xc003e66000?, 0x2?, 0xc0009a4181?})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:178 +0x38 fp=0xc0011392b0 sp=0xc001139228 pc=0x37ad0b8
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).Scan(0xc0003ac3a0, {{0xc0009a4181, 0x3d}, {0xc003e66000, 0x5143cb, 0x516000}, 0x0})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:409 +0x58a fp=0xc001139ba8 sp=0xc0011392b0 pc=0x37aed0a
github.com/aquasecurity/trivy/pkg/fanal/analyzer/secret.(*SecretAnalyzer).Analyze(0xc0003ac3a0, {0x58f3120?, 0xc0003f3730?}, {{0x7fffe5683c2d, 0x1}, {0xc0009a4181, 0x3d}, {0x5900688, 0xc000e6a0d0}, {0x58e2b60, ...}, ...})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/secret/secret.go:137 +0x4f5 fp=0xc001139e00 sp=0xc001139ba8 pc=0x386e515
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.func1({0x58f6010?, 0xc0003ac3a0}, {0x58f3708?, 0xc000bbe020?})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:439 +0x245 fp=0xc001139fb0 sp=0xc001139e00 pc=0x2cf2e85
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.gowrap1()
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:451 +0x30 fp=0xc001139fe0 sp=0xc001139fb0 pc=0x2cf2c10
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc001139fe8 sp=0xc001139fe0 pc=0x479be1
created by github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile in goroutine 1
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:434 +0x4d0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
goroutine 6536 gp=0xc001186540 m=nil [runnable]:
log/slog.(*Logger).With(0xc001ae9ba0?, {0xc0014b3a98?, 0x2?, 0x2?})
/opt/hostedtoolcache/go/1.22.9/x64/src/log/slog/logger.go:127 +0xf2 fp=0xc0014b32b0 sp=0xc0014b32a8 pc=0x7f3b12
github.com/aquasecurity/trivy/pkg/fanal/secret.(*Scanner).Scan(0xc0003ac3a0, {{0xc0012ee441, 0x1d}, {0xc0009f7300, 0x1158, 0x1300}, 0x0})
/home/runner/work/trivy/trivy/pkg/fanal/secret/scanner.go:395 +0x4af fp=0xc0014b3ba8 sp=0xc0014b32b0 pc=0x37aec2f
github.com/aquasecurity/trivy/pkg/fanal/analyzer/secret.(*SecretAnalyzer).Analyze(0xc0003ac3a0, {0x58f3120?, 0xc0003f3730?}, {{0x7fffe5683c2d, 0x1}, {0xc0012ee441, 0x1d}, {0x5900688, 0xc000c44680}, {0x58e2b60, ...}, ...})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/secret/secret.go:137 +0x4f5 fp=0xc0014b3e00 sp=0xc0014b3ba8 pc=0x386e515
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.func1({0x58f6010?, 0xc0003ac3a0}, {0x58f3708?, 0xc000ca4130?})
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:439 +0x245 fp=0xc0014b3fb0 sp=0xc0014b3e00 pc=0x2cf2e85
github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile.gowrap1()
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:451 +0x30 fp=0xc0014b3fe0 sp=0xc0014b3fb0 pc=0x2cf2c10
runtime.goexit({})
/opt/hostedtoolcache/go/1.22.9/x64/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0014b3fe8 sp=0xc0014b3fe0 pc=0x479be1
created by github.com/aquasecurity/trivy/pkg/fanal/analyzer.AnalyzerGroup.AnalyzeFile in goroutine 1
/home/runner/work/trivy/trivy/pkg/fanal/analyzer/analyzer.go:434 +0x4d0
scan-vulnerabilityreport-5f49f458b4-5g5pr clear-stale-pid
rax 0xc00358c000
rbx 0x65adc
rcx 0x65adc
rdx 0x65adc
rdi 0xf501
rsi 0xc0024e4000
rbp 0xc0016eb218
rsp 0xc0016eb1d8
r8 0x73
r9 0x32
r10 0x7f2dc377ffa8
r11 0xb53383306c6f8ec5
r12 0x723c618
r13 0xc0016eafb8
r14 0xc000b29500
r15 0x3
rip 0x4deef9
rflags 0x212
cs 0x33
fs 0x0
gs 0x0
What did you expect to happen:
Finish without the error above and sucessfuly scan the image.
Anything else you would like to add:
- The image scanned is kong:3.8 originated in the chart: https://github.com/kubernetes/dashboard/blob/bb8b78bfe7bd8f75fd26ad03e7c201bcd90d1cb4/charts/kubernetes-dashboard/Chart.yaml#L46 and concretely: https://github.com/Kong/charts/blob/b3673091cdde4f12a7edf3f23217b07b09bd5df7/charts/kong/templates/deployment.yaml#L95
- It happens just for this specific container. There exists another vulnerability report, that process the image without issues.
Environment:
- Trivy-Operator version (use
trivy-operator version):
2025/02/12 11:13:48 maxprocs: Updating GOMAXPROCS=1: using minimum allowed GOMAXPROCS
{"level":"info","ts":"2025-02-12T11:13:48Z","logger":"main","msg":"Starting operator","buildInfo":{"Version":"0.23.0","Commit":"72ac532ab1a0d77a0a63131cf08392809ed24b6c","Date":"2024-11-26T09:02:15Z","Executable":""}}
{"level":"info","ts":"2025-02-12T11:13:48Z","logger":"operator","msg":"Resolved install mode","install mode":"AllNamespaces","operator namespace":"trivy-system","target namespaces":[],"exclude namespaces":"","target workloads":["pod","replicaset","replicationcontroller","statefulset","daemonset","cronjob","job"]}
{"level":"info","ts":"2025-02-12T11:13:48Z","logger":"operator","msg":"Watching all namespaces"}
- Kubernetes version (use
kubectl version): 1.30.4 - OS (macOS 10.15, Windows 10, Ubuntu 19.10 etc): Ubuntu 22.04
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.