-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Lucian,

On 3/15/13 4:03 PM, Lucian I wrote:
> We are seeing a leak of Unix domain sockets in Tomcat 7.0.26
> configured to run with Http11NioProtocol connector. This is running
> in Ubuntu Linux 12.04.1 LTS with OpenJDK 6u24.
> 
> The leak is about 15 Unix domain sockets per hour (based on our
> typical request rate), and is reaching the 4096 file limit we
> configured in 10 days. These Unix domain sockets tied to the Tomcat
> process can be seen by issuing lsof command (e.g. lsof | grep
> tomcat7 | grep socket).

Can we get a sample of that output?

I'm fairly sure that Java does not provide access to UNIX domain
sockets, so this would have to be at the JVM implementation layer.
Obviously, Tomcat could be mismanaging some resource which ultimately
leaks these things at the native level, but it's not like we can grep
the Tomcat code for "new UNIXDomainSocket" or anything like that.

> The leak is absent when Tomcat runs using the BIO connector, and
> this would indicate a problem in the NIO connector implementation.
> 
> I've seen the same situation indicated by someone else in the past,
> but with no response: 
> http://mail-archives.apache.org/mod_mbox/tomcat-users/201201.mbox/%3CCAJkSUv-DDKTCQ-pD7W=qovmph1dxexovcr+3mcgu05cqpt7...@mail.gmail.com%3E

There
> 
certainly was a response:
http://markmail.org/message/wvurlmltc4mxtrcp

If you can provide more information, I'm sure it will help to diagnose
any problem. Are you able to upgrade to the current version of Tomcat 7?

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEAREIAAYFAlFDhS8ACgkQ9CaO5/Lv0PAr8gCgvAAXZkMQetf2UpsxlPfei9BC
YesAnjeYavpJsW5cN4sOuj/nowE7ODs/
=5nyS
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to