Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: binary MIME-Version: 1.0 X-Mailer: MIME-tools 5.411 (Entity 5.404) X-RT-Original-Encoding: iso-8859-1 Content-Length: 2352 From schemers@slapshot.stanford.edu Tue Jul 15 14:43:32 2003 Received: from pacific-carrier-annex.mit.edu (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.7.21.83]) by krbdev.mit.edu (8.9.3) with ESMTP id OAA24772; Tue, 15 Jul 2003 14:43:32 -0400 (EDT) Received: from smtp2.Stanford.EDU (smtp2.Stanford.EDU [171.64.14.116]) by pacific-carrier-annex.mit.edu (8.12.4/8.9.2) with ESMTP id h6FIhV6G011160 for ; Tue, 15 Jul 2003 14:43:31 -0400 (EDT) Received: (from root@localhost) by smtp2.Stanford.EDU (8.12.9/8.12.9) id h6FIhUxb008559 for krb5-bugs@mit.edu; Tue, 15 Jul 2003 11:43:30 -0700 (PDT) Received: from slapshot.stanford.edu (slapshot.Stanford.EDU [171.64.26.45]) by smtp2.Stanford.EDU (8.12.9/8.12.9) with ESMTP id h6FIhSrH008530 for ; Tue, 15 Jul 2003 11:43:28 -0700 (PDT) Received: from slapshot.stanford.edu (localhost.localdomain [127.0.0.1]) by slapshot.stanford.edu (8.12.8/8.12.8) with ESMTP id h6FIhTj6018437 for ; Tue, 15 Jul 2003 11:43:29 -0700 Received: (from schemers@localhost) by slapshot.stanford.edu (8.12.8/8.12.8/Submit) id h6FIhS7U018435; Tue, 15 Jul 2003 11:43:28 -0700 Date: Tue, 15 Jul 2003 11:43:28 -0700 Message-Id: <200307151843.h6FIhS7U018435@slapshot.stanford.edu> To: krb5-bugs@mit.edu Subject: memory leak in krb5_{init,free}_context? From: schemers@stanford.edu Reply-To: schemers@stanford.edu Cc: X-send-pr-version: 3.99 >Submitter-Id: net >Originator: >Organization: Stanford University >Confidential: no >Synopsis: memory leak in krb5_{init,free}_context >Severity: serious >Priority: medium >Category: krb5-libs >Class: sw-bug >Release: krb5-1.3 >Environment: System: Linux slapshot.stanford.edu 2.4.20-18.9smp #1 SMP Thu May 29 06:55:05 EDT 2003 i686 i686 i386 GNU/Linux Architecture: i686 >Description: There seems to be a memory leak when calling krb5_init_context followed by a krb5_free_context. >How-To-Repeat: Run this program and top at the same time. The memory for the process keeps growing and growing. Using /usr/kerberos from Red Hat 9 there is no leak, while when using Kerberos 1.3 from MIT there is a leak. #include int main(int argc, char *argv[]) { krb5_context ctx; while (1) { krb5_init_context(&ctx); krb5_free_context(ctx); } } >Fix: haven't investigated that far yet...