Received: from cathode-dark-space.mit.edu (CATHODE-DARK-SPACE.MIT.EDU [18.18.1.96]) by krbdev.mit.edu (8.9.3) with ESMTP id RAA24829; Tue, 15 Jul 2003 17:24:28 -0400 (EDT) Received: (from tlyu@localhost) by cathode-dark-space.mit.edu (8.9.3p2) id RAA03907; Tue, 15 Jul 2003 17:24:27 -0400 (EDT) To: rt@krbdev.mit.edu Subject: Re: [krbdev.mit.edu #1665] memory leak in krb5_{init,free}_context References: From: Tom Yu Date: Tue, 15 Jul 2003 17:24:27 -0400 In-Reply-To: ("The RT System itself via RT"'s message of "Tue, 15 Jul 2003 14:43:36 -0400 (EDT)") Message-Id: Lines: 20 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii RT-Send-Cc: X-RT-Original-Encoding: us-ascii Content-Length: 792 >>>>> "schemers" == The RT System itself via RT writes: schemers> There seems to be a memory leak when calling schemers> krb5_init_context followed by a krb5_free_context. This seems to be the result of add_error_table not checking whether the error table it's adding is already present in the et_list. >> How-To-Repeat: schemers> Run this program and top at the same time. The memory for schemers> the process keeps growing and growing. Using /usr/kerberos schemers> from Red Hat 9 there is no leak, while when using Kerberos schemers> 1.3 from MIT there is a leak. Interesting. Is it possible that Red Hat 9 has a different com_err library for its krb5 installation? I don't think any of the relevant code in our tree has changed at all recently. ---Tom