From schemers@slapshot.stanford.edu Tue Jul 15 14:43:32 2003
Received: from pacific-carrier-annex.mit.edu (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.7.21.83]) by krbdev.mit.edu (8.9.3) with ESMTP
id OAA24772; Tue, 15 Jul 2003 14:43:32 -0400 (EDT)
Received: from smtp2.Stanford.EDU (smtp2.Stanford.EDU [171.64.14.116])
by pacific-carrier-annex.mit.edu (8.12.4/8.9.2) with ESMTP id h6FIhV6G011160
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 14:43:31 -0400 (EDT)
Received: (from root@localhost)
by smtp2.Stanford.EDU (8.12.9/8.12.9) id h6FIhUxb008559
for krb5-bugs@mit.edu; Tue, 15 Jul 2003 11:43:30 -0700 (PDT)
Received: from slapshot.stanford.edu (slapshot.Stanford.EDU [171.64.26.45])
by smtp2.Stanford.EDU (8.12.9/8.12.9) with ESMTP id h6FIhSrH008530
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 11:43:28 -0700 (PDT)
Received: from slapshot.stanford.edu (localhost.localdomain [127.0.0.1])
by slapshot.stanford.edu (8.12.8/8.12.8) with ESMTP id h6FIhTj6018437
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 11:43:29 -0700
Received: (from schemers@localhost)
by slapshot.stanford.edu (8.12.8/8.12.8/Submit) id h6FIhS7U018435;
Tue, 15 Jul 2003 11:43:28 -0700
Date: Tue, 15 Jul 2003 11:43:28 -0700
Message-Id: <200307151843.h6FIhS7U018435@slapshot.stanford.edu>
To: krb5-bugs@mit.edu
Subject: memory leak in krb5_{init,free}_context?
From: schemers@stanford.edu
Reply-To: schemers@stanford.edu
Cc:
X-send-pr-version: 3.99
System: Linux slapshot.stanford.edu 2.4.20-18.9smp #1 SMP Thu May 29 06:55:05 EDT 2003 i686 i686 i386 GNU/Linux
Architecture: i686
followed by a krb5_free_context.
Run this program and top at the same time. The memory for the process keeps
growing and growing. Using /usr/kerberos from Red Hat 9 there is no leak,
while when using Kerberos 1.3 from MIT there is a leak.
#include <krb5.h>
int
main(int argc, char *argv[])
{
krb5_context ctx;
while (1) {
krb5_init_context(&ctx);
krb5_free_context(ctx);
}
}
Received: from pacific-carrier-annex.mit.edu (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.7.21.83]) by krbdev.mit.edu (8.9.3) with ESMTP
id OAA24772; Tue, 15 Jul 2003 14:43:32 -0400 (EDT)
Received: from smtp2.Stanford.EDU (smtp2.Stanford.EDU [171.64.14.116])
by pacific-carrier-annex.mit.edu (8.12.4/8.9.2) with ESMTP id h6FIhV6G011160
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 14:43:31 -0400 (EDT)
Received: (from root@localhost)
by smtp2.Stanford.EDU (8.12.9/8.12.9) id h6FIhUxb008559
for krb5-bugs@mit.edu; Tue, 15 Jul 2003 11:43:30 -0700 (PDT)
Received: from slapshot.stanford.edu (slapshot.Stanford.EDU [171.64.26.45])
by smtp2.Stanford.EDU (8.12.9/8.12.9) with ESMTP id h6FIhSrH008530
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 11:43:28 -0700 (PDT)
Received: from slapshot.stanford.edu (localhost.localdomain [127.0.0.1])
by slapshot.stanford.edu (8.12.8/8.12.8) with ESMTP id h6FIhTj6018437
for <krb5-bugs@mit.edu>; Tue, 15 Jul 2003 11:43:29 -0700
Received: (from schemers@localhost)
by slapshot.stanford.edu (8.12.8/8.12.8/Submit) id h6FIhS7U018435;
Tue, 15 Jul 2003 11:43:28 -0700
Date: Tue, 15 Jul 2003 11:43:28 -0700
Message-Id: <200307151843.h6FIhS7U018435@slapshot.stanford.edu>
To: krb5-bugs@mit.edu
Subject: memory leak in krb5_{init,free}_context?
From: schemers@stanford.edu
Reply-To: schemers@stanford.edu
Cc:
X-send-pr-version: 3.99
Show quoted text
>Submitter-Id: net
>Originator:
>Organization:
Stanford University>Originator:
>Organization:
Show quoted text
>Confidential: no
>Synopsis: memory leak in krb5_{init,free}_context
>Severity: serious
>Priority: medium
>Category: krb5-libs
>Class: sw-bug
>Release: krb5-1.3
>Environment:
>Synopsis: memory leak in krb5_{init,free}_context
>Severity: serious
>Priority: medium
>Category: krb5-libs
>Class: sw-bug
>Release: krb5-1.3
>Environment:
System: Linux slapshot.stanford.edu 2.4.20-18.9smp #1 SMP Thu May 29 06:55:05 EDT 2003 i686 i686 i386 GNU/Linux
Architecture: i686
Show quoted text
>Description:
There seems to be a memory leak when calling krb5_init_contextfollowed by a krb5_free_context.
Show quoted text
>How-To-Repeat:
Run this program and top at the same time. The memory for the process keeps
growing and growing. Using /usr/kerberos from Red Hat 9 there is no leak,
while when using Kerberos 1.3 from MIT there is a leak.
#include <krb5.h>
int
main(int argc, char *argv[])
{
krb5_context ctx;
while (1) {
krb5_init_context(&ctx);
krb5_free_context(ctx);
}
}
Show quoted text
>Fix:
haven't investigated that far yet...