[squid-users] SSL bump memory leak

Steve Hill steve at opendium.com
Tue Feb 23 21:08:10 UTC 2016


On 23/02/16 17:30, Amos Jeffries wrote:

> And a leak (real or pseudo) means they are still hanging around in
> memory for some reason other than cert-cache references (being in the
> cache by definition is not-leaking). For example as part of active TLS
> sessions when the core was produced.

Seems pretty unlikely that there were over 130 thousand active TLS
sessions in just one of 2 worker threads at the time the core was generated.

I'm seeing Squid processes continually increase to many gigabytes in
size before I have to restart them to avoid the servers ending up deep
in swap.  If this was just things held during "active sessions" I would
expect to see the memory freed up again over night when there isn't much
traffic - I see no such reduction in memory usage.

-- 

 - Steve Hill
   Technical Director
   Opendium Limited     http://www.opendium.com

Direct contacts:
   Instant messager: xmpp:steve at opendium.com
   Email:            steve at opendium.com
   Phone:            sip:steve at opendium.com

Sales / enquiries contacts:
   Email:            sales at opendium.com
   Phone:            +44-1792-825748 / sip:sales at opendium.com

Support contacts:
   Email:            support at opendium.com
   Phone:            +44-1792-824568 / sip:support at opendium.com


More information about the squid-users mailing list