Bug 1371301

Summary: File descriptor leak due to temporary file descriptors creation in src/closures.c
Product: Red Hat Enterprise Linux 7 Reporter: Kyle Walker <kwalker>
Component: libffiAssignee: Andrew Haley <aph>
Status: CLOSED WONTFIX QA Contact: qe-baseos-tools-bugs
Severity: low Docs Contact:
Priority: unspecified    
Version: 7.2CC: cww, fweimer
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-11-30 22:39:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Kyle Walker 2016-08-29 20:31:33 UTC
Description of problem:
 Processes that make use of the libffi dlmmap() codepath, such as python's cTypes module, result in a file descriptor remaining for the duration of the process. This is visible in lsof output as a "(deleted)" temporary file descriptor.

Version-Release number of selected component (if applicable):
 libffi-3.0.13-16.el7.x86_64

How reproducible:
 Easily

Steps to Reproduce:
1. Start a python application that makes use of the ctypes module, and subsequently libffi library, such as "tuned".
2. Verify if the process contains a "(deleted)" temporary file descriptor
3.

Actual results:
 An entry is present similar to:
   COMM PID root 6u REG 253,0 4096 51133553 /tmp/ffiEmToG6 (deleted)

Expected results:
 No deleted, and unnecessary file descriptors

Additional info:
 The file descriptor above is not needed as the underlying dlmmap_locked function call maps the file descriptor into the addressable space for the process and is not needed.