[37969] in Kerberos

home help back first fref pref prev next nref lref last post

Re: fd (file descriptor) leak in replay cache

daemon@ATHENA.MIT.EDU (Robbie Harwood)
Thu Apr 20 10:01:40 2017

From: Robbie Harwood <rharwood@redhat.com>
To: Parity error <bootup32@gmail.com>, kerberos@mit.edu
In-Reply-To: <CA+rFPTO9ZEoRZa4b15dNO64CiTyxBkftYhP8dWQ0BRdEbAU0-g@mail.gmail.com>
Date: Thu, 20 Apr 2017 10:01:19 -0400
Message-ID: <jlgy3uvb2kw.fsf@thriss.redhat.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============7362223816753137155=="
Errors-To: kerberos-bounces@mit.edu

--===============7362223816753137155==
Content-Type: multipart/signed; boundary="=-=-=";
	micalg=pgp-sha256; protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain

Parity error <bootup32@gmail.com> writes:

> We have been using the kerberos 1.10.3 library and we find that
> occasionally a lot of the following files are kept open by the library
> and they fill up the fd limit of the process,

Hopefully someone else has a more detailed answer for you, but there
have been 82 commits since then which are leak fixes, some of which may
relate to the problem.  So: "probably".

Unfortunately, krb5-10 is from early 2012.  MIT upstream focuses most
support efforts around 1.15-series (current release) and 1.14-series
(maintenance release).

If you can reproduce it on another system, perhaps try with a newer krb5
and see?  (Based on the version, you're using Centos6; Centos7 has
krb5-1.14.1 at the time of writing.)

--Robbie

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=YLSp
-----END PGP SIGNATURE-----
--=-=-=--

--===============7362223816753137155==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

--===============7362223816753137155==--

home help back first fref pref prev next nref lref last post