Bug 1371301 - File descriptor leak due to temporary file descriptors creation in src/closures.c
Summary: File descriptor leak due to temporary file descriptors creation in src/closur...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: libffi
Version: 7.2
Hardware: Unspecified
OS: Unspecified
unspecified
low
Target Milestone: rc
: ---
Assignee: Andrew Haley
QA Contact: qe-baseos-tools-bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-08-29 20:31 UTC by Kyle Walker
Modified: 2019-12-16 06:32 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-11-30 22:39:56 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Kyle Walker 2016-08-29 20:31:33 UTC
Description of problem:
 Processes that make use of the libffi dlmmap() codepath, such as python's cTypes module, result in a file descriptor remaining for the duration of the process. This is visible in lsof output as a "(deleted)" temporary file descriptor.

Version-Release number of selected component (if applicable):
 libffi-3.0.13-16.el7.x86_64

How reproducible:
 Easily

Steps to Reproduce:
1. Start a python application that makes use of the ctypes module, and subsequently libffi library, such as "tuned".
2. Verify if the process contains a "(deleted)" temporary file descriptor
3.

Actual results:
 An entry is present similar to:
   COMM PID root 6u REG 253,0 4096 51133553 /tmp/ffiEmToG6 (deleted)

Expected results:
 No deleted, and unnecessary file descriptors

Additional info:
 The file descriptor above is not needed as the underlying dlmmap_locked function call maps the file descriptor into the addressable space for the process and is not needed.


Note You need to log in before you can comment on or make changes to this bug.