[squid-users] SSL bump memory leak
Steve Hill
steve at opendium.com
Tue Feb 23 21:08:10 UTC 2016
On 23/02/16 17:30, Amos Jeffries wrote:
> And a leak (real or pseudo) means they are still hanging around in
> memory for some reason other than cert-cache references (being in the
> cache by definition is not-leaking). For example as part of active TLS
> sessions when the core was produced.
Seems pretty unlikely that there were over 130 thousand active TLS
sessions in just one of 2 worker threads at the time the core was generated.
I'm seeing Squid processes continually increase to many gigabytes in
size before I have to restart them to avoid the servers ending up deep
in swap. If this was just things held during "active sessions" I would
expect to see the memory freed up again over night when there isn't much
traffic - I see no such reduction in memory usage.
--
- Steve Hill
Technical Director
Opendium Limited http://www.opendium.com
Direct contacts:
Instant messager: xmpp:steve at opendium.com
Email: steve at opendium.com
Phone: sip:steve at opendium.com
Sales / enquiries contacts:
Email: sales at opendium.com
Phone: +44-1792-825748 / sip:sales at opendium.com
Support contacts:
Email: support at opendium.com
Phone: +44-1792-824568 / sip:support at opendium.com
More information about the squid-users
mailing list