Another leak: tls_new_client_session
Stefan.Paetow at jisc.ac.uk
Thu Mar 5 12:12:13 CET 2015
> Leaking the ssl structs with 2 client sessions was around 300k so if it
> doesn't grow much beyond that, 356k could easily be plausible for no
> leaks we care about.
Unfortunately I had to restart the server at 8pm last night after realising that there were in fact no proper auth/proxy sessions that occurred (instead, the requests would abort). However, after restarting and checking it worked, looking at the memory usage this morning at 9:36, the FR RSS grew by 2980KB over 13.5 hours. Based on past data, this is a large improvement (where in 3.0.4 it would grow by that amount in around 2.5 hours). The server will continue to run some more for a 24h checkpoint.
I hope that's useful.
Moonshot Industry & Research Liaison Coordinator
t: +44 (0)1235 822 125
xmpp: stefanp at jabber.dev.ja.net
Lumen House, Library Avenue, Harwell Oxford, Didcot, OX11 0SG
Jisc is a registered charity (number 1149740) and a company limited by guarantee which is registered in England under Company No. 5747339, VAT No. GB 197 0632 86. Jisc’s registered office is: One Castlepark, Tower Hill, Bristol, BS2 0JA. T 0203 697 5800.
Jisc Collections and Janet Ltd. is a wholly owned Jisc subsidiary and a company limited by guarantee which is registered in England under Company No. number 2881024, VAT No. GB 197 0632 86. The registered office is: Lumen House, Library Avenue, Harwell, Didcot, Oxfordshire, OX11 0SG. T 01235 822200.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 496 bytes
Desc: Message signed with OpenPGP using GPGMail
More information about the Freeradius-Devel