cURL
Haxx ad
libcurl

curl's project page on SourceForge.net

Sponsors:
Haxx

cURL > Mailing List > Monthly Index > Single Mail

curl-tracker Archives

[ curl-Bugs-3408783 ] [SuSE] mem leaks visible in valgrind

From: SourceForge.net <noreply_at_sourceforge.net>
Date: Tue, 13 Sep 2011 18:14:39 +0200

Bugs item #3408783, was opened at 2011-09-13 18:14
Message generated for change (Tracker Item Submitted) made by rudlof
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=100976&aid=3408783&group_id=976

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: libcurl
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Stephan Rudlof (rudlof)
Assigned to: Daniel Stenberg (bagder)
Summary: [SuSE] mem leaks visible in valgrind

Initial Comment:
Followup to ID: 3370249

Seem to be problems in libs used by cURL, not by cURL itself (but developers should know better).
Problems does not show up in Debian 6.0.2.

Attached are files to reproduce the problem (unzip, make and run from CL).
Currently worst mem leak (100 GETs without reuse of connection):
==2104== HEAP SUMMARY:
==2104== in use at exit: 71,308 bytes in 2,553 blocks
==2104== total heap usage: 148,223 allocs, 145,670 frees, 86,232,716 bytes allocated
==2104==
==2104== 2,100 bytes in 100 blocks are definitely lost in loss record 556 of 563
==2104== at 0x4C261D7: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
==2104== by 0x6071A1B: CRYPTO_malloc (in /usr/lib64/libcrypto.so.0.9.8)
==2104== by 0x60A7784: BUF_strndup (in /usr/lib64/libcrypto.so.0.9.8)
==2104== by 0x5D745D9: ssl3_ctrl (in /usr/lib64/libssl.so.0.9.8)
==2104== by 0x4E54944: ossl_connect_common (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E54A24: Curl_ossl_connect (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E675D1: Curl_ssl_connect (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E3FBC1: Curl_http_connect (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E49879: Curl_protocol_connect (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E49F37: Curl_setup_conn (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E4C942: Curl_connect (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104== by 0x4E5B082: Curl_do_perform (in /home/ruslof/ViP/MemLeak/local/lib/libcurl.so.4.2.0)
==2104==
==2104== LEAK SUMMARY:
==2104== definitely lost: 2,100 bytes in 100 blocks
==2104== indirectly lost: 0 bytes in 0 blocks
==2104== possibly lost: 0 bytes in 0 blocks
==2104== still reachable: 69,208 bytes in 2,453 blocks
==2104== suppressed: 0 bytes in 0 blocks

Couldn\'t trigger the name resolution related leaks in ID: 3370249 with this test program, though (have to check, if workaround is needed anymore).

Best regards,
Stephan

nfldevvip1:~/ViP/MemLeak: ./local/bin/curl -V

curl 7.21.7 (x86_64-unknown-linux-gnu) libcurl/7.21.7 OpenSSL/0.9.8h zlib/1.2.3
Protocols: dict file ftp ftps gopher http https imap imaps pop3 pop3s rtsp smtp smtps telnet tftp
Features: Largefile NTLM SSL libz

SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 1
Linux nfldevvip1 2.6.32.45-0.3-default #1 SMP 2011-08-22 10:12:58 +0200 x86_64 x86_64 x86_64 GNU/Linux

----------------------------------------------------------------------

You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=100976&aid=3408783&group_id=976
Received on 2011-09-13

These mail archives are generated by hypermail.

donate! Page updated November 12, 2010.
web site info

File upload with ASP.NET