Bug 204465 - ypbind leaks UDP ports
ypbind leaks UDP ports
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: ypbind (Show other bugs)
All Linux
high Severity medium
: ---
: ---
Assigned To: Steve Dickson
Ben Levenson
Depends On:
Blocks: 217874
  Show dependency treegraph
Reported: 2006-08-29 07:19 EDT by Bastien Nocera
Modified: 2007-11-30 17:07 EST (History)
2 users (show)

See Also:
Fixed In Version: RHBA-2007-0263
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-05-01 18:45:04 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Purposed Patch (1.77 KB, patch)
2006-11-30 15:32 EST, Steve Dickson
no flags Details | Diff

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2007:0263 normal SHIPPED_LIVE ypbind bug fix update 2007-04-28 13:52:21 EDT

  None (edit)
Description Bastien Nocera 2006-08-29 07:19:06 EDT

Make /etc/yp.conf point to a working NIS server:
domain example.com      server test.machine.redhat.com

And run:
while true; do ypcat hosts > /dev/null ; echo -n ".";done

After a period of time, ypbind will be leaking a lot of file descriptors.

$ netstat -unap | grep ypbind | wc -l                                          

ypbind will be leaking more sockets if the yp.conf contains unreachable servers.
The same problem occurs on RHEL3.
Comment 1 Frank Hirtz 2006-11-08 15:06:11 EST
Client requests that we bump the priority as they're having problems due to the

Bumping this priority.

piidb243 /var/log 22# lsof -n -p 12354|grep UDP|wc -l
Comment 3 Steve Dickson 2006-11-29 10:13:55 EST
It appears there is some type of race condition in ypbind's server pinging
code that is causing this port leak. The ports that are bing leaked are actually
listening ports, meaning they are ports that are waiting for incoming

Using the '-no-ping' flag to ypbind, at least in my testing, does stop the port
from being leaked (which does make sense since setting that flag
turns off the code in question).  Also in my testing, it appears setting that
flag has no ill effects on ypbind recovering from a server outage. The
recover is a bit verbose (in the amount of traffic that is generated) but
ypbind does seem to recover.

So I would suggest (for now) setting the '-no-ping' flag as a work-around,
until we get to the bottom of the root cause of this leakage... 
Comment 4 Steve Dickson 2006-11-30 15:32:04 EST
Created attachment 142519 [details]
Purposed Patch

There as a race condition created between the pinging thread and
main ypbind thread. This condition can causes both threads to ping
a server (in this case a dead one) at the same time. This in turn
causes listening ports to be created that will never be closed.

In my testing, this patch seem to fix the problem by
having the thread check the state of the connect to the
server once it gets the mutex. If the connection has has
already been  made, depending which thread it is, the
appropriate  action will be taken.
Comment 7 Steve Dickson 2006-12-12 14:39:52 EST
Fixed in ypbind-1.17.2-11
Comment 9 RHEL Product and Program Management 2006-12-22 14:24:06 EST
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
Comment 13 Chris Snook 2007-02-08 08:34:37 EST
Do we need to clone this for RHEL 5?
Comment 15 Steve Dickson 2007-03-08 18:51:57 EST
> Do we need to clone this for RHEL 5?
there is on already bz217874
Comment 16 Red Hat Bugzilla 2007-05-01 18:45:04 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

Comment 17 Issue Tracker 2007-06-28 18:02:33 EDT
I've opened the request against RHEL3 as IT 125349 and we'll follow it

Internal Status set to 'Resolved'
Status set to: Closed by Tech
Ticket type set to: 'Problem'

This event sent from IssueTracker by fhirtz 
 issue 99997

Note You need to log in before you can comment on or make changes to this bug.