| Summary: | vdsm-tool segfaults during vdsmd start | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Jiri Denemark <jdenemar> |
| Component: | libvirt | Assignee: | Jiri Denemark <jdenemar> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Virtualization Bugs <virt-bugs> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 7.0 | CC: | acathrow, asegurap, bazulay, berrange, bili, clalancette, dallan, danken, didi, dyuan, iheim, jdenemar, jforbes, laine, libvirt-maint, mgoldboi, mzhan, sbonazzo, shyu, smizrahi, veillard, ybronhei, yeylon, zhwang |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | infra | ||
| Fixed In Version: | libvirt-1.1.1-15.el7 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1034312 | Environment: | |
| Last Closed: | 2014-06-13 13:29:04 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Jiri Denemark
2013-12-10 13:23:44 UTC
Hi jiri Since there was a dependency issue for vdsm installing in rhel7, so I installed it omit the dependent paket ,however, after i finished installing the vdsm packet, i didn't find the vdsmd_init_common.sh script in /usr/libexec/vdsm/ , so i can reproduce this bug as the comment 0 description, also I'm not sure which steps i missed, can you give me some advise? thanks pkg info libvirt-1.1.1-15.el7.x86_64 qemu-kvm-rhev-1.5.3-21.el7.x86_64 kernel-3.10.0-61.el7.x86_64 qemu-img-1.5.3-21.el7.x86_64 steps 1. download the following four packet from the brew # ll -rw-r--r--. 1 root root 652140 Dec 16 18:56 vdsm-4.10.3-17.el7.x86_64.rpm -rw-r--r--. 1 root root 58184 Dec 16 18:56 vdsm-cli-4.10.3-17.el7.noarch.rpm -rw-r--r--. 1 root root 77032 Dec 16 18:56 vdsm-python-4.10.3-17.el7.x86_64.rpm -rw-r--r--. 1 root root 26924 Dec 16 18:56 vdsm-xmlrpc-4.10.3-17.el7.noarch.rpm 2.install the vdsm with the rpm command(I have install the qemu-img packet and other dependent packet except the qemu-kvm-img) , we can see it depends on the qemu-kvm-img packet # rpm -ivh vdsm-* error: Failed dependencies: qemu-kvm-img is needed by vdsm-4.10.3-17.el7.x86_64 # rpm -ivh vdsm-* --nodeps --force Preparing... ################################# [100%] Updating / installing... 1:vdsm-python-4.10.3-17.el7 ################################# [ 25%] 2:vdsm-xmlrpc-4.10.3-17.el7 ################################# [ 50%] 3:vdsm-4.10.3-17.el7 ################################# [ 75%] 4:vdsm-cli-4.10.3-17.el7 ################################# [100%] 3.After installing, check the /usr/libexec/vdsm/ , find there wasn't vdsmd_init_common.sh script over there, so i can't reproduce this bug as the comment0 description # ll /usr/libexec/vdsm/ total 56 drwxr-xr-x. 28 root root 4096 Dec 16 19:08 hooks -rwxr-xr-x. 1 root root 692 Jun 11 2013 ovirt_functions.sh -rwxr-xr-x. 1 root root 475 Jun 11 2013 persist-vdsm-hooks -rwxr-xr-x. 1 root root 24176 Jun 11 2013 safelease -rwxr-xr-x. 1 root root 6812 Jun 11 2013 spmprotect.sh -rwxr-xr-x. 1 root root 1954 Jun 11 2013 spmstop.sh -rwxr-xr-x. 1 root root 696 Jun 11 2013 unpersist-vdsm-hook -rwxr-xr-x. 1 root root 2424 Jun 11 2013 vdsm-gencerts.sh hi jiri I just re-check the patch, then do some testing about it ,can you help me have a look aboat my steps, were they enough to reproduce this bug? thanks pkg info libvirt-1.1.1-14.el7.x86_64 kernel-3.10.0-60.el7.x86_64 qemu-kvm-rhev-1.5.3-21.el7.x86_64 steps 1.Configure the tls environment 2.Connect to the hypervisor running on host using TLS without SASL via ipv4 after connected, i could get some invalid read reports from valgrind # valgrind -v --leak-check=full virsh -c qemu+tls://zhwang71/system list --all Please enter your authentication name: redhat Please enter your password: --15980-- REDIR: 0x80526c0 (__stpcpy_sse2_unaligned) redirected to 0x4a0b260 (stpcpy) --15980-- REDIR: 0x8053ed0 (__strcat_sse2_unaligned) redirected to 0x4a08fa0 (strcat) Id Name State ---------------------------------------------------- - rhel shut off - rhel6 shut off - rhel7 shut off - rhel7com shut off - rhel7qcow2 shut off - rheltest2 shut off - test shut off - win7 shut off ==15980== Thread 2: ==15980== Invalid read of size 8 ==15980== at 0x6D4F95F: _sasl_getcallback (in /usr/lib64/libsasl2.so.3.0.0) ==15980== by 0x6D511B0: _sasl_log (in /usr/lib64/libsasl2.so.3.0.0) ==15980== by 0x14D9CD37: ??? (in /usr/lib64/sasl2/libdigestmd5.so.3.0.0) ==15980== by 0x6D4D4C3: ??? (in /usr/lib64/libsasl2.so.3.0.0) ==15980== by 0x6D504FA: sasl_dispose (in /usr/lib64/libsasl2.so.3.0.0) ==15980== by 0x4CA892A: virObjectUnref (virobject.c:262) ==15980== by 0x4D99513: virNetSocketDispose (virnetsocket.c:1024) ==15980== by 0x4CA892A: virObjectUnref (virobject.c:262) ==15980== by 0x4C8C8B9: virEventPollCleanupHandles (vireventpoll.c:580) ==15980== by 0x4C8DB27: virEventPollRunOnce (vireventpoll.c:649) ==15980== by 0x4C8C44C: virEventRunDefaultImpl (virevent.c:273) ==15980== by 0x129374: vshEventLoop (virsh.c:2290) ==15980== Address 0xd94c800 is 0 bytes inside a block of size 168 free'd ==15980== at 0x4A07577: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==15980== by 0x4C753D9: virFree (viralloc.c:566) ==15980== by 0x4D816F0: doRemoteOpen (remote_driver.c:4206) ==15980== by 0x4D81F75: remoteConnectOpen (remote_driver.c:1027) ==15980== by 0x4D27FCC: do_open (libvirt.c:1239) ==15980== by 0x4D2A838: virConnectOpenAuth (libvirt.c:1481) ==15980== by 0x12BB99: vshReconnect (virsh.c:336) ==15980== by 0x126DBA: main (virsh.c:2353) ==15980== -- ==16522== HEAP SUMMARY: ==16522== in use at exit: 571,462 bytes in 2,303 blocks ==16522== total heap usage: 18,606 allocs, 16,303 frees, 5,733,185 bytes allocated ==16522== ==16522== Searching for pointers to 2,303 not-freed blocks ==16522== Checked 1,598,904 bytes ==16522== ==16522== LEAK SUMMARY: ==16522== definitely lost: 0 bytes in 0 blocks ==16522== indirectly lost: 0 bytes in 0 blocks ==16522== possibly lost: 0 bytes in 0 blocks ==16522== still reachable: 571,462 bytes in 2,303 blocks ==16522== suppressed: 0 bytes in 0 blocks you can reference my attachment for more info 3.After i update the libvirt to the libvirt-1.1.1-15, the invalid read reports from valgrind in step 2 gone. Yes, I believe that's the ideal way of verifying this bug. Good job. hi jiri thanks for you quick response, however, i found other invalid read report from valgrind while i update the libvirt to the libvirt-1.1.1-15, not sure whether they are harmfull or harmful or harmless, sorry to miss it in the comment4. thanks # valgrind -v --leak-check=full virsh -c qemu+tls://zhwang71/system list --all Please enter your authentication name: redhat Please enter your password: =3545== Invalid read of size 1 ==3545== at 0x8004EBB: vfprintf (in /usr/lib64/libc-2.17.so) ==3545== by 0x80C9414: __vasprintf_chk (in /usr/lib64/libc-2.17.so) ==3545== by 0x4CB5075: virVasprintfInternal (stdio2.h:210) ==3545== by 0x4C9A745: virLogVMessage (virlog.c:842) ==3545== by 0x4C9AC26: virLogMessage (virlog.c:778) ==3545== by 0x4D98BC4: virNetSASLSessionClientStep (virnetsaslcontext.c:460) ==3545== by 0x4D819D5: doRemoteOpen (remote_driver.c:4131) ==3545== by 0x4D81FE5: remoteConnectOpen (remote_driver.c:1027) ==3545== by 0x4D2802C: do_open (libvirt.c:1239) ==3545== by 0x4D2A898: virConnectOpenAuth (libvirt.c:1481) ==3545== by 0x12BB99: vshReconnect (virsh.c:336) ==3545== by 0x126DBA: main (virsh.c:2353) ==3545== Address 0xd9a184e is 0 bytes after a block of size 126 alloc'd ==3545== at 0x4A081D4: calloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==3545== by 0x80E45A4: xdr_array (in /usr/lib64/libc-2.17.so) ==3545== by 0x4D86251: xdr_remote_auth_sasl_start_ret (remote_protocol.c:3134) ==3545== by 0x4D9729F: virNetMessageDecodePayload (virnetmessage.c:405) ==3545== by 0x4D8DC6B: virNetClientProgramCall (virnetclientprogram.c:377) ==3545== by 0x4D69391: callFull.isra.2 (remote_driver.c:5727) ==3545== by 0x4D8190A: doRemoteOpen (remote_driver.c:5749) ==3545== by 0x4D81FE5: remoteConnectOpen (remote_driver.c:1027) ==3545== by 0x4D2802C: do_open (libvirt.c:1239) ==3545== by 0x4D2A898: virConnectOpenAuth (libvirt.c:1481) ==3545== by 0x12BB99: vshReconnect (virsh.c:336) ==3545== by 0x126DBA: main (virsh.c:2353) Invalid reads are rarely harmless but we don't try to fix all of them in this bug. Please, file a new bug for it. This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request. |