Veselin Kozhuharski
2020-Feb-24 11:49 UTC
[Libguestfs] *** buffer overflow detected *** accessing invalid FD in libguestfs
We have extended collectd virt plugin to extract info about disk usage from a libvirt domain using libguestfs. In addition to my previous mail I am attaching some more infomration about the problem. Currently the collectd plugin works fine and retrieves the required statistics. The problem that I face happens after certain number of cycles (getting disk usage statistics). Collectd is terminated with the following error: Feb 20 15:09:36 tve50 collectd[17720]: *** buffer overflow detected ***: /usr/sbin/collectd terminated This happens after about 490-500 calls of my statistics read function. Collectd is terminated with signal SIGABRT with the following backtrace: (gdb) bt #0 0x00007ffff71f2e97 in raise () from /lib/x86_64-linux-gnu/libc.so.6 #1 0x00007ffff71f4801 in abort () from /lib/x86_64-linux-gnu/libc.so.6 #2 0x00007ffff723d897 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 #3 0x00007ffff72e8cff in ?? () from /lib/x86_64-linux-gnu/libc.so.6 #4 0x00007ffff72e8d21 in __fortify_fail () from /lib/x86_64-linux-gnu/libc.so.6 #5 0x00007ffff72e6a10 in __chk_fail () from /lib/x86_64-linux-gnu/libc.so.6 #6 0x00007ffff72e8c0a in __fdelt_warn () from /lib/x86_64-linux-gnu/libc.so.6 #7 0x00007ffff47ed8ba in loop (cmd=cmd@entry=0x7fffbc02abe0) at ../../../lib/command.c:662 #8 0x00007ffff47ee2f5 in guestfs_int_cmd_run (cmd=0x7fffbc02abe0) at ../../../lib/command.c:767 #9 0x00007ffff47efefc in disk_create_qcow2 (optargs=0x7fffbc008d60, backingfile=0x7fffbc09ef30 "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", size=-1, orig_filename=0x7fffbc0301f0 "/tmp/libguestfszZtmRI/overlay1.qcow2", g=0x7fffbc008d60) at ../../../lib/create.c:348 #10 guestfs_impl_disk_create (g=g@entry=0x7fffbc008d60, filename=filename@entry=0x7fffbc0301f0 "/tmp/libguestfszZtmRI/overlay1.qcow2", format=<optimized out>, format@entry=0x7ffff4843998 "qcow2", size=size@entry=-1, optargs=optargs@entry=0x7fffca7fb1a0) at ../../../lib/create.c:88 #11 0x00007ffff4794ca5 in guestfs_disk_create_argv (g=g@entry=0x7fffbc008d60, filename=filename@entry=0x7fffbc0301f0 "/tmp/libguestfszZtmRI/overlay1.qcow2", format=format@entry=0x7ffff4843998 "qcow2", size=size@entry=-1, optargs=optargs@entry=0x7fffca7fb1a0) at ../../../lib/actions-3.c:224 #12 0x00007ffff4807b18 in create_cow_overlay_direct (g=0x7fffbc008d60, datav=<optimized out>, drv=0x7fffbc03a890) at ../../../lib/launch-direct.c:89 #13 0x00007ffff47f0b44 in create_overlay (g=0x7fffbc008d60, drv=0x7fffbc03a890) at ../../../lib/drives.c:87 #14 0x00007ffff47f0d7b in create_drive_file (g=g@entry=0x7fffbc008d60, data=data@entry=0x7fffca7fb2a0) at ../../../lib/drives.c:119 #15 0x00007ffff47f1c55 in guestfs_impl_add_drive_opts (g=g@entry=0x7fffbc008d60, filename=<optimized out>, filename@entry=0x7fffbc10d540 "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", optargs=optargs@entry=0x7fffca7fb420) at ../../../lib/drives.c:826 #16 0x00007ffff4784927 in guestfs_add_drive_opts_argv (g=g@entry=0x7fffbc008d60, filename=filename@entry=0x7fffbc10d540 "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", optargs=optargs@entry=0x7fffca7fb420) at ../../../lib/actions-2.c:180 #17 0x00007ffff48128e0 in add_disk (g=g@entry=0x7fffbc008d60, filename=0x7fffbc10d540 "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", format=<optimized out>, readonly_in_xml=<optimized out>, protocol=<optimized out>, server=<optimized out>, username=0x0, secret=0x0, datavp=0x7fffca7fb610) at ../../../lib/libvirt-domain.c:396 #18 0x00007ffff4813cd6 in for_each_disk (f=0x7ffff48127e0 <add_disk>, data=0x7fffca7fb610, doc=0x7fffbc10cf80, conn=0x7fffbc01fa10, g=0x7fffbc008d60) at ../../../lib/libvirt-domain.c:782 #19 guestfs_impl_add_libvirt_dom (g=g@entry=0x7fffbc008d60, domvp=domvp@entry=0x7fffbc064000, optargs=optargs@entry=0x7fffca7fb790) at ../../../lib/libvirt-domain.c:323 #20 0x00007ffff47ab2c3 in guestfs_add_libvirt_dom_argv (g=g@entry=0x7fffbc008d60, dom=dom@entry=0x7fffbc064000, optargs=optargs@entry=0x7fffca7fb790) at ../../../lib/actions-4.c:174 #21 0x00007ffff4812cf6 in guestfs_impl_add_domain (g=g@entry=0x7fffbc008d60, domain_name=domain_name@entry=0x7fffbc0338e0 "tve50:00000013", optargs=optargs@entry=0x7fffca7fb8c0) at ../../../lib/libvirt-domain.c:163 #22 0x00007ffff4760368 in guestfs_add_domain_argv (g=0x7fffbc008d60, dom=0x7fffbc0338e0 "tve50:00000013", optargs=optargs@entry=0x7fffca7fb8c0) at ../../../lib/actions-0.c:139 #23 0x00007ffff47dfc38 in guestfs_add_domain_va (g=<optimized out>, dom=<optimized out>, args=args@entry=0x7fffca7fb920) at ../../../lib/actions-variants.c:107 #24 0x00007ffff47dfee4 in guestfs_add_domain (g=g@entry=0x7fffbc008d60, dom=dom@entry=0x7fffbc0338e0 "tve50:00000013") at ../../../lib/actions-variants.c:45 #25 0x00007ffff4a78bec in refresh_lists (inst=inst@entry=0x7ffff4c7f940 <lv_read_user_data>) at src/virt.c:2049 #26 0x00007ffff4a7a327 in lv_read (ud=<optimized out>) at src/virt.c:1656 #27 0x0000555555564a1c in plugin_read_thread (args=<optimized out>) at src/daemon/plugin.c:540 #28 0x00007ffff79b66db in start_thread () from /lib/x86_64-linux-gnu/libpthread.so.0 #29 0x00007ffff72d588f in clone () from /lib/x86_64-linux-gnu/libc.so.6 (gdb) quit Deeper analysis shows the error is related to file descriptors handling using FD_* macros in loop() function, most probably trying to access fd which is outside the valid range. Any hints how to avoid or handle this situation would be highly appreciated. -- *Veselin Kozhuharski** |* Software Engineer Direct: +359 2 439 2590 ext. 3912 *|* Mobile: +359 887 412116 | veselin_k*@telco.com <mzabaruk@telco.com>* *Telco Systems | **www.telco.com <http://www.telco.com/>* Follow us: *LinkedIn <http://www.linkedin.com/company/telco-systems>* | *Twitter <http://twitter.com/TelcoSystems>* | *Facebook <https://www.facebook.com/TelcoSystems>* | *YouTube <http://www.youtube.com/TelcoSystems>* | *Blog <http://www.telco.com/blog>* |
Richard W.M. Jones
2020-Feb-24 13:50 UTC
Re: [Libguestfs] *** buffer overflow detected *** accessing invalid FD in libguestfs
On Mon, Feb 24, 2020 at 01:49:38PM +0200, Veselin Kozhuharski wrote:> We have extended collectd virt plugin to extract info about disk usage from > a libvirt domain using libguestfs. In addition to my previous mail I am > attaching some more infomration about the problem. > Currently the collectd plugin works fine and retrieves the required > statistics. The problem that I face happens after certain number of cycles > (getting disk usage statistics). Collectd is terminated with the following > error: > > Feb 20 15:09:36 tve50 collectd[17720]: *** buffer overflow detected ***: > /usr/sbin/collectd terminated > > This happens after about 490-500 calls of my statistics read function. > Collectd is terminated with signal SIGABRT with the following backtrace: > > (gdb) bt > #0 0x00007ffff71f2e97 in raise () from /lib/x86_64-linux-gnu/libc.so.6 > #1 0x00007ffff71f4801 in abort () from /lib/x86_64-linux-gnu/libc.so.6 > #2 0x00007ffff723d897 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 > #3 0x00007ffff72e8cff in ?? () from /lib/x86_64-linux-gnu/libc.so.6 > #4 0x00007ffff72e8d21 in __fortify_fail () from > /lib/x86_64-linux-gnu/libc.so.6 > #5 0x00007ffff72e6a10 in __chk_fail () from /lib/x86_64-linux-gnu/libc.so.6 > #6 0x00007ffff72e8c0a in __fdelt_warn () from > /lib/x86_64-linux-gnu/libc.so.6 > #7 0x00007ffff47ed8ba in loop (cmd=cmd@entry=0x7fffbc02abe0) at > ../../../lib/command.c:662 > #8 0x00007ffff47ee2f5 in guestfs_int_cmd_run (cmd=0x7fffbc02abe0) at > ../../../lib/command.c:767 > #9 0x00007ffff47efefc in disk_create_qcow2 (optargs=0x7fffbc008d60, > backingfile=0x7fffbc09ef30 > "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", > size=-1, > orig_filename=0x7fffbc0301f0 "/tmp/libguestfszZtmRI/overlay1.qcow2", > g=0x7fffbc008d60) at ../../../lib/create.c:348 > #10 guestfs_impl_disk_create (g=g@entry=0x7fffbc008d60, > filename=filename@entry=0x7fffbc0301f0 > "/tmp/libguestfszZtmRI/overlay1.qcow2", format=<optimized out>, > format@entry=0x7ffff4843998 "qcow2", size=size@entry=-1, > optargs=optargs@entry=0x7fffca7fb1a0) at ../../../lib/create.c:88 > #11 0x00007ffff4794ca5 in guestfs_disk_create_argv (g=g@entry=0x7fffbc008d60, > filename=filename@entry=0x7fffbc0301f0 > "/tmp/libguestfszZtmRI/overlay1.qcow2", > format=format@entry=0x7ffff4843998 "qcow2", size=size@entry=-1, > optargs=optargs@entry=0x7fffca7fb1a0) at ../../../lib/actions-3.c:224 > #12 0x00007ffff4807b18 in create_cow_overlay_direct (g=0x7fffbc008d60, > datav=<optimized out>, drv=0x7fffbc03a890) at > ../../../lib/launch-direct.c:89 > #13 0x00007ffff47f0b44 in create_overlay (g=0x7fffbc008d60, > drv=0x7fffbc03a890) at ../../../lib/drives.c:87 > #14 0x00007ffff47f0d7b in create_drive_file (g=g@entry=0x7fffbc008d60, > data=data@entry=0x7fffca7fb2a0) at ../../../lib/drives.c:119 > #15 0x00007ffff47f1c55 in guestfs_impl_add_drive_opts > (g=g@entry=0x7fffbc008d60, > filename=<optimized out>, > filename@entry=0x7fffbc10d540 > "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", > optargs=optargs@entry=0x7fffca7fb420) at ../../../lib/drives.c:826 > #16 0x00007ffff4784927 in guestfs_add_drive_opts_argv > (g=g@entry=0x7fffbc008d60, > > filename=filename@entry=0x7fffbc10d540 > "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", > optargs=optargs@entry=0x7fffca7fb420) at ../../../lib/actions-2.c:180 > #17 0x00007ffff48128e0 in add_disk (g=g@entry=0x7fffbc008d60, > filename=0x7fffbc10d540 > "/var/lib/nova/instances/5ca86029-d296-4261-9a67-908bdd6c4eab/disk", > format=<optimized out>, > readonly_in_xml=<optimized out>, protocol=<optimized out>, > server=<optimized out>, username=0x0, secret=0x0, datavp=0x7fffca7fb610) at > ../../../lib/libvirt-domain.c:396 > #18 0x00007ffff4813cd6 in for_each_disk (f=0x7ffff48127e0 <add_disk>, > data=0x7fffca7fb610, doc=0x7fffbc10cf80, conn=0x7fffbc01fa10, > g=0x7fffbc008d60) > at ../../../lib/libvirt-domain.c:782 > #19 guestfs_impl_add_libvirt_dom (g=g@entry=0x7fffbc008d60, > domvp=domvp@entry=0x7fffbc064000, optargs=optargs@entry=0x7fffca7fb790) at > ../../../lib/libvirt-domain.c:323 > #20 0x00007ffff47ab2c3 in guestfs_add_libvirt_dom_argv > (g=g@entry=0x7fffbc008d60, > dom=dom@entry=0x7fffbc064000, optargs=optargs@entry=0x7fffca7fb790) at > ../../../lib/actions-4.c:174 > #21 0x00007ffff4812cf6 in guestfs_impl_add_domain (g=g@entry=0x7fffbc008d60, > domain_name=domain_name@entry=0x7fffbc0338e0 "tve50:00000013", > optargs=optargs@entry=0x7fffca7fb8c0) > at ../../../lib/libvirt-domain.c:163 > #22 0x00007ffff4760368 in guestfs_add_domain_argv (g=0x7fffbc008d60, > dom=0x7fffbc0338e0 "tve50:00000013", optargs=optargs@entry=0x7fffca7fb8c0) > at ../../../lib/actions-0.c:139 > #23 0x00007ffff47dfc38 in guestfs_add_domain_va (g=<optimized out>, > dom=<optimized out>, args=args@entry=0x7fffca7fb920) at > ../../../lib/actions-variants.c:107 > #24 0x00007ffff47dfee4 in guestfs_add_domain (g=g@entry=0x7fffbc008d60, > dom=dom@entry=0x7fffbc0338e0 "tve50:00000013") at > ../../../lib/actions-variants.c:45 > #25 0x00007ffff4a78bec in refresh_lists (inst=inst@entry=0x7ffff4c7f940 > <lv_read_user_data>) at src/virt.c:2049 > #26 0x00007ffff4a7a327 in lv_read (ud=<optimized out>) at src/virt.c:1656 > #27 0x0000555555564a1c in plugin_read_thread (args=<optimized out>) at > src/daemon/plugin.c:540 > #28 0x00007ffff79b66db in start_thread () from > /lib/x86_64-linux-gnu/libpthread.so.0 > #29 0x00007ffff72d588f in clone () from /lib/x86_64-linux-gnu/libc.so.6 > (gdb) quit > > Deeper analysis shows the error is related to file descriptors handling > using FD_* macros in loop() function, most probably trying to access fd > which is outside the valid range.It's hard to say from the information so far. What is the file descriptor number when it crashes? It's unfortunate that this loop is using select instead of poll, so perhaps rewriting it to use poll would be useful. Rich.> Any hints how to avoid or handle this situation would be highly appreciated. > > -- > > > *Veselin Kozhuharski** |* Software Engineer > > Direct: +359 2 439 2590 ext. 3912 *|* Mobile: +359 887 412116 | > veselin_k*@telco.com > <mzabaruk@telco.com>* > > *Telco Systems | **www.telco.com <http://www.telco.com/>* > > Follow us: *LinkedIn <http://www.linkedin.com/company/telco-systems>* > | *Twitter > <http://twitter.com/TelcoSystems>* | *Facebook > <https://www.facebook.com/TelcoSystems>* | *YouTube > <http://www.youtube.com/TelcoSystems>* | *Blog <http://www.telco.com/blog>* > |> _______________________________________________ > Libguestfs mailing list > Libguestfs@redhat.com > https://www.redhat.com/mailman/listinfo/libguestfs-- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Read my programming and virtualization blog: http://rwmj.wordpress.com virt-builder quickly builds VMs from scratch http://libguestfs.org/virt-builder.1.html
Richard W.M. Jones
2020-Feb-26 09:43 UTC
Re: [Libguestfs] *** buffer overflow detected *** accessing invalid FD in libguestfs
On Wed, Feb 26, 2020 at 11:21:18AM +0200, Veselin Kozhuharski wrote:> Hallo Rich, > > Here is the fd list and total number just before collectd application > crashes. Before that the number of used fd's is constantly increasing. It > looks like a fd leak inside libguestfs to me. I am trying to debug the fd > handling inside the library. > > root@localhost:~# less /proc/8829/fdinfo/ > Display all 1035 possibilities? (y or n) > 0 1029 129 161 193 224 256 288 319 350 382 413 445 > 477 508 54 571 602 634 666 698 729 760 792 823 > 855 887 918 95 981 > 1 103 13 162 194 225 257 289 32 351 383 414 446 > 478 509 540 572 603 635 667 699 73 761 793 824 > 856 888 919 950 982 > 10 1030 130 163 195 226 258 29 320 352 384 415 447 > 479 51 541 573 604 636 668 7 730 762 794 825 > 857 889 92 951 983 > 100 1031 131 164 196 227 259 290 321 353 385 416 448 > 48 510 542 574 605 637 669 70 731 763 795 826 > 858 89 920 952 984 > 1000 1032 132 165 197 228 26 291 322 354 386 417 449 > 480 511 543 575 606 638 67 700 732 764 796 827 > 859 890 921 953 985 > 1001 1033 133 166 198 229 260 292 323 355 387 418 45 > 481 512 544 576 607 639 670 701 733 765 797 828 > 86 891 922 954 986 > 1002 1034 134 167 199 23 261 293 324 356 388 419 450 > 482 513 545 577 608 64 671 702 734 766 798 829 > 860 892 923 955 987 > 1003 1035 135 168 2 230 262 294 325 357 389 42 451 > 483 514 546 578 609 640 672 703 735 767 799 83 > 861 893 924 956 988 > 1004 104 136 169 20 231 263 295 326 358 39 420 452 > 484 515 547 579 61 641 673 704 736 768 8 830 > 862 894 925 957 989 > 1005 105 137 17 200 232 264 296 327 359 390 421 453 > 485 516 548 58 610 642 674 705 737 769 80 831 > 863 895 926 958 99 > 1006 106 138 170 201 233 265 297 328 36 391 422 454 > 486 517 549 580 611 643 675 706 738 77 800 832 > 864 896 927 959 990 > 1007 107 139 171 202 234 266 298 329 360 392 423 455 > 487 518 55 581 612 644 676 707 739 770 801 833 > 865 897 928 96 991 > 1008 108 14 172 203 235 267 299 33 361 393 424 456 > 488 519 550 582 613 645 677 708 74 771 802 834 > 866 898 929 960 992 > 1009 109 140 173 204 236 268 3 330 362 394 425 457 > 489 52 551 583 614 646 678 709 740 772 803 835 > 867 899 93 961 993 > 101 11 141 174 205 237 269 30 331 363 395 426 458 > 49 520 552 584 615 647 679 71 741 773 804 836 > 868 9 930 962 994 > 1010 110 142 175 206 238 27 300 332 364 396 427 459 > 490 521 553 585 616 648 68 710 742 774 805 837 > 869 90 931 963 995 > 1011 111 143 176 207 239 270 301 333 365 397 428 46 > 491 522 554 586 617 649 680 711 743 775 806 838 > 87 900 932 964 996 > 1012 112 144 177 208 24 271 302 334 366 398 429 460 > 492 523 555 587 618 65 681 712 744 776 807 839 > 870 901 933 965 997 > 1013 113 145 178 209 240 272 303 335 367 399 43 461 > 493 524 556 588 619 650 682 713 745 777 808 84 > 871 902 934 966 998 > 1014 114 146 179 21 241 273 304 336 368 4 430 462 > 494 525 557 589 62 651 683 714 746 778 809 840 > 872 903 935 967 999 > 1015 115 147 18 210 242 274 305 337 369 40 431 463 > 495 526 558 59 620 652 684 715 747 779 81 841 > 873 904 936 968 > 1016 116 148 180 211 243 275 306 338 37 400 432 464 > 496 527 559 590 621 653 685 716 748 78 810 842 > 874 905 937 969 > 1017 117 149 181 212 244 276 307 339 370 401 433 465 > 497 528 56 591 622 654 686 717 749 780 811 843 > 875 906 938 97 > 1018 118 150 182 213 245 277 308 34 371 402 434 466 > 498 529 560 592 623 655 687 718 75 781 812 844 > 876 907 939 970 > 1019 119 151 183 214 246 278 309 340 372 403 435 467 > 499 53 561 593 624 656 688 719 750 782 813 845 > 877 908 94 971 > 102 12 152 184 215 247 279 31 341 373 404 436 468 > 5 530 562 594 625 657 689 72 751 783 814 846 > 878 909 940 972 > 1020 120 153 185 216 248 28 310 342 374 405 437 469 > 50 531 563 595 626 658 69 720 752 784 815 847 > 879 91 941 973 > 1021 121 154 186 217 249 280 311 343 375 406 438 47 > 500 532 564 596 627 659 690 721 753 785 816 848 > 88 910 942 974 > 1022 122 155 187 218 25 281 312 344 376 407 439 470 > 501 533 565 597 628 66 691 722 754 786 817 849 > 880 911 943 975 > 1023 123 156 188 219 250 282 313 345 377 408 44 471 > 502 534 566 598 629 660 692 723 755 787 818 85 > 881 912 944 976 > 1024 124 157 189 22 251 283 314 346 378 409 440 472 > 503 535 567 599 63 661 693 724 756 788 819 850 > 882 913 945 977 > 1025 125 158 19 220 252 284 315 347 379 41 441 473 > 504 536 568 6 630 662 694 725 757 789 82 851 > 883 914 946 978 > 1026 126 159 190 221 253 285 316 348 38 410 442 474 > 505 537 569 60 631 663 695 726 758 79 820 852 > 884 915 947 979 > 1027 127 16 191 222 254 286 317 349 380 411 443 475 > 506 538 57 600 632 664 696 727 759 790 821 853 > 885 916 948 98 > 1028 128 160 192 223 255 287 318 35 381 412 444 476 > 507 539 570 601 633 665 697 728 76 791 822 854 > 886 917 949 980 > > Do you suspect any particular handling inside libguestfs? > Thanks!Yes I guess the select() function here needs to be replaced with poll(). https://github.com/libguestfs/libguestfs/blob/d9b4e3086e11b18dfc5215a7c4c21ae637be4fe6/lib/command.c#L651 Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Read my programming and virtualization blog: http://rwmj.wordpress.com libguestfs lets you edit virtual machines. Supports shell scripting, bindings from many languages. http://libguestfs.org
Pino Toscano
2020-Feb-26 10:59 UTC
Re: [Libguestfs] *** buffer overflow detected *** accessing invalid FD in libguestfs
On Wednesday, 26 February 2020 10:43:27 CET Richard W.M. Jones wrote:> On Wed, Feb 26, 2020 at 11:21:18AM +0200, Veselin Kozhuharski wrote: > > Hallo Rich, > > > > Here is the fd list and total number just before collectd application > > crashes. Before that the number of used fd's is constantly increasing. It > > looks like a fd leak inside libguestfs to me. I am trying to debug the fd > > handling inside the library. > > > > root@localhost:~# less /proc/8829/fdinfo/ > > Display all 1035 possibilities? (y or n) > > 0 1029 129 161 193 224 256 288 319 350 382 413 445 > > 477 508 54 571 602 634 666 698 729 760 792 823 > > 855 887 918 95 981 > > 1 103 13 162 194 225 257 289 32 351 383 414 446 > > 478 509 540 572 603 635 667 699 73 761 793 824 > > 856 888 919 950 982 > > 10 1030 130 163 195 226 258 29 320 352 384 415 447 > > 479 51 541 573 604 636 668 7 730 762 794 825 > > 857 889 92 951 983 > > 100 1031 131 164 196 227 259 290 321 353 385 416 448 > > 48 510 542 574 605 637 669 70 731 763 795 826 > > 858 89 920 952 984 > > 1000 1032 132 165 197 228 26 291 322 354 386 417 449 > > 480 511 543 575 606 638 67 700 732 764 796 827 > > 859 890 921 953 985 > > 1001 1033 133 166 198 229 260 292 323 355 387 418 45 > > 481 512 544 576 607 639 670 701 733 765 797 828 > > 86 891 922 954 986 > > 1002 1034 134 167 199 23 261 293 324 356 388 419 450 > > 482 513 545 577 608 64 671 702 734 766 798 829 > > 860 892 923 955 987 > > 1003 1035 135 168 2 230 262 294 325 357 389 42 451 > > 483 514 546 578 609 640 672 703 735 767 799 83 > > 861 893 924 956 988 > > 1004 104 136 169 20 231 263 295 326 358 39 420 452 > > 484 515 547 579 61 641 673 704 736 768 8 830 > > 862 894 925 957 989 > > 1005 105 137 17 200 232 264 296 327 359 390 421 453 > > 485 516 548 58 610 642 674 705 737 769 80 831 > > 863 895 926 958 99 > > 1006 106 138 170 201 233 265 297 328 36 391 422 454 > > 486 517 549 580 611 643 675 706 738 77 800 832 > > 864 896 927 959 990 > > 1007 107 139 171 202 234 266 298 329 360 392 423 455 > > 487 518 55 581 612 644 676 707 739 770 801 833 > > 865 897 928 96 991 > > 1008 108 14 172 203 235 267 299 33 361 393 424 456 > > 488 519 550 582 613 645 677 708 74 771 802 834 > > 866 898 929 960 992 > > 1009 109 140 173 204 236 268 3 330 362 394 425 457 > > 489 52 551 583 614 646 678 709 740 772 803 835 > > 867 899 93 961 993 > > 101 11 141 174 205 237 269 30 331 363 395 426 458 > > 49 520 552 584 615 647 679 71 741 773 804 836 > > 868 9 930 962 994 > > 1010 110 142 175 206 238 27 300 332 364 396 427 459 > > 490 521 553 585 616 648 68 710 742 774 805 837 > > 869 90 931 963 995 > > 1011 111 143 176 207 239 270 301 333 365 397 428 46 > > 491 522 554 586 617 649 680 711 743 775 806 838 > > 87 900 932 964 996 > > 1012 112 144 177 208 24 271 302 334 366 398 429 460 > > 492 523 555 587 618 65 681 712 744 776 807 839 > > 870 901 933 965 997 > > 1013 113 145 178 209 240 272 303 335 367 399 43 461 > > 493 524 556 588 619 650 682 713 745 777 808 84 > > 871 902 934 966 998 > > 1014 114 146 179 21 241 273 304 336 368 4 430 462 > > 494 525 557 589 62 651 683 714 746 778 809 840 > > 872 903 935 967 999 > > 1015 115 147 18 210 242 274 305 337 369 40 431 463 > > 495 526 558 59 620 652 684 715 747 779 81 841 > > 873 904 936 968 > > 1016 116 148 180 211 243 275 306 338 37 400 432 464 > > 496 527 559 590 621 653 685 716 748 78 810 842 > > 874 905 937 969 > > 1017 117 149 181 212 244 276 307 339 370 401 433 465 > > 497 528 56 591 622 654 686 717 749 780 811 843 > > 875 906 938 97 > > 1018 118 150 182 213 245 277 308 34 371 402 434 466 > > 498 529 560 592 623 655 687 718 75 781 812 844 > > 876 907 939 970 > > 1019 119 151 183 214 246 278 309 340 372 403 435 467 > > 499 53 561 593 624 656 688 719 750 782 813 845 > > 877 908 94 971 > > 102 12 152 184 215 247 279 31 341 373 404 436 468 > > 5 530 562 594 625 657 689 72 751 783 814 846 > > 878 909 940 972 > > 1020 120 153 185 216 248 28 310 342 374 405 437 469 > > 50 531 563 595 626 658 69 720 752 784 815 847 > > 879 91 941 973 > > 1021 121 154 186 217 249 280 311 343 375 406 438 47 > > 500 532 564 596 627 659 690 721 753 785 816 848 > > 88 910 942 974 > > 1022 122 155 187 218 25 281 312 344 376 407 439 470 > > 501 533 565 597 628 66 691 722 754 786 817 849 > > 880 911 943 975 > > 1023 123 156 188 219 250 282 313 345 377 408 44 471 > > 502 534 566 598 629 660 692 723 755 787 818 85 > > 881 912 944 976 > > 1024 124 157 189 22 251 283 314 346 378 409 440 472 > > 503 535 567 599 63 661 693 724 756 788 819 850 > > 882 913 945 977 > > 1025 125 158 19 220 252 284 315 347 379 41 441 473 > > 504 536 568 6 630 662 694 725 757 789 82 851 > > 883 914 946 978 > > 1026 126 159 190 221 253 285 316 348 38 410 442 474 > > 505 537 569 60 631 663 695 726 758 79 820 852 > > 884 915 947 979 > > 1027 127 16 191 222 254 286 317 349 380 411 443 475 > > 506 538 57 600 632 664 696 727 759 790 821 853 > > 885 916 948 98 > > 1028 128 160 192 223 255 287 318 35 381 412 444 476 > > 507 539 570 601 633 665 697 728 76 791 822 854 > > 886 917 949 980 > > > > Do you suspect any particular handling inside libguestfs? > > Thanks! > > Yes I guess the select() function here needs to be replaced with poll(). > > https://github.com/libguestfs/libguestfs/blob/d9b4e3086e11b18dfc5215a7c4c21ae637be4fe6/lib/command.c#L651Indeed, we ought to. I'll try to get it converted. Also, note for libguestfs people: select() is used also in the daemon, although that should not be a problem, since it does not use many libraries, and in general has few fd's opened at runtime. Note that collectd needs similar fixes, as I read in its bug tracker: https://github.com/collectd/collectd/pull/3363 -- Pino Toscano
Seemingly Similar Threads
- *** buffer overflow detected *** accessing invalid FD in libguestfs
- Re: *** buffer overflow detected *** accessing invalid FD in libguestfs
- buffer overflow detected in collectd using libguestfs
- [PATCH node] correctly use collectd udp dns entry
- Opening the 2.4 commit fest (RRD)