Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
DescriptionRichard W.M. Jones
2013-07-11 17:50:00 UTC
+++ This bug was initially created as a clone of Bug #983218 +++
--- Additional comment from Richard W.M. Jones on 2013-07-11 12:25:20 EDT ---
I can see how a double free could occur.
The key observation is the last error message which was captured
in the guestfs handle:
(gdb) print g->last_error
$5 = 0x7f296400c370 "link: /var/tmp/.guestfs-1002/kernel /var/tmp/.guestfs-1002/kernel.29013: Operation not permitted"
This errors occurs in hard_link_to_cached_appliance:
https://github.com/libguestfs/libguestfs/blob/af1c53d104180415a8584c48f19fd4ea7df224f5/src/appliance.c#L607
In hard_link_to_cached_appliance, along this error path
params.kernel would be allocated and then free (but not set
back to NULL).
Two levels higher up in the stack, the libvirt backend returns
from guestfs___build_appliance with an error:
https://github.com/libguestfs/libguestfs/blob/823628d41f898982979ab7dd53656377bef8ce1d/src/launch-libvirt.c#L232
and jumps to cleanup: which frees params.kernel again. A
double-free.
The fix may be to set the kernel pointer to NULL after
freeing it the first time, but I need to systematically
check this code.
--- Additional comment from Richard W.M. Jones on 2013-07-11 12:53:49 EDT ---
Attached is a reproducer (although I think what it may be
reproducing is a related but ever so slightly different
bug in the same area of code).
It requires a working 'sudo' command in order to run
the following:
sudo chattr +i /some/temporary/file
Install perl-Sys-Guestfs, download the attached script,
chmod +x the script, and just run it.
If it *segfaults* => bug reproduced.
If it prints "bug 983218 appears to be fixed" => bug fixed.
If it does/prints anything else, result is INVALID. Please
let me know if this happens.
https://bugzilla.redhat.com/attachment.cgi?id=772313
Comment 1Richard W.M. Jones
2013-07-11 18:15:07 UTC
Created attachment 772358[details]
Updated reproducer script.
Updated reproducer script. Ignore link in previous comment.
Comment 2Richard W.M. Jones
2013-07-19 10:39:32 UTC
Verified with libguestfs-1.22.6-15.el7
Steps:
1. Install perl-Sys-Guestfs-1.22.6-15.el7
2. Download test script from Comment 1
3. [lkong@rhel7libguestfs ~]$ sudo ./test.pl
[sudo] password for lkong:
bug 983218 appears to be fixed
Comment 6Richard W.M. Jones
2013-11-17 09:32:42 UTC
(In reply to Lingfei Kong from comment #5)
> 3. [lkong@rhel7libguestfs ~]$ sudo ./test.pl
Note that the test script requires 'sudo'. That doesn't mean
you should run the test script under sudo. Run the
test program as you.
(In reply to Richard W.M. Jones from comment #6)
>
> Note that the test script requires 'sudo'. That doesn't mean
> you should run the test script under sudo. Run the
> test program as you.
Thanks for your reminding, I read the test script and understand that the test code need 'sudo' permission but not means that I should do the test under "sudo".
This request was resolved in Red Hat Enterprise Linux 7.0.
Contact your manager or support representative in case you have further questions about the request.