From owner-freebsd-questions@FreeBSD.ORG Fri Sep 26 07:04:34 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 37B6E402 for ; Fri, 26 Sep 2014 07:04:34 +0000 (UTC) Received: from btw.pki2.com (btw.pki2.com [IPv6:2001:470:a:6fd::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D53367DF for ; Fri, 26 Sep 2014 07:04:33 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) by btw.pki2.com (8.14.9/8.14.9) with ESMTP id s8Q74Mah056120; Fri, 26 Sep 2014 00:04:22 -0700 (PDT) (envelope-from freebsd@pki2.com) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pki2.com; s=pki2; t=1411715062; bh=zsNsfFYyRtQeqohd25RiXpRYR1numDEcvjgtIflh0kA=; h=Subject:From:To:Cc:In-Reply-To:References:Date; b=jGH/jyXvjlLxzk9lyjFt+tBssczIKVuFZh6bot63TsJRgXx46peAGOOc3HL27OZD7 uFU7RVqZDMmmYmvr1PN7u4j2hKkelXCdtveXk10nr/tdomw2AZz56nBUYFI8n17HWr /tCXSQZmgbbSR/Z3g7rqow8/tuM24mA0ytQAEuL4OMG7F7Ij/xFbQuBKNSJFHbOtl2 lfWZaDnjWUc+Tc+19Wd3zhraNhS0KTAnI5P3fa/0oSH0nkY7JCbLoz/gsboJEjmZZi Ayi9cwOJ559PtOhi0eP6tlQS5W/OrEzRwc8J9xbpfeg6je185pC+EjL4fY3Q+w58bo SqbKonms9o4SA== Subject: Re: squid-3.4.8_1 leaking memory From: Dennis Glatting To: Victor Sudakov In-Reply-To: <20140926022151.GA91110@admin.sibptus.tomsk.ru> References: <20140925045657.GA71070@admin.sibptus.tomsk.ru> <1411642468.3895.847.camel@btw.pki2.com> <20140925110428.GA79336@admin.sibptus.tomsk.ru> <1411644140.3895.860.camel@btw.pki2.com> <20140925165533.GB81782@admin.sibptus.tomsk.ru> <1411664745.3895.864.camel@btw.pki2.com> <20140926022151.GA91110@admin.sibptus.tomsk.ru> Content-Type: text/plain; charset="ISO-8859-1" Date: Fri, 26 Sep 2014 00:04:22 -0700 Message-ID: <1411715062.3895.876.camel@btw.pki2.com> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit X-SoftwareMunitions-MailScanner-Information: Dennis Glatting X-SoftwareMunitions-MailScanner-ID: s8Q74Mah056120 X-SoftwareMunitions-MailScanner: Found to be clean X-MailScanner-From: freebsd@pki2.com Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Sep 2014 07:04:34 -0000 On Fri, 2014-09-26 at 09:21 +0700, Victor Sudakov wrote: > Dennis Glatting wrote: > > The attached shar is what I am using while I was waiting for www/squid > > to be updated. It lives outside the ports tree. Can't say if it will > > solve your problem. > > I have tried it. It leaks too, albeit more slowly. Maybe a daily > restart will do, instead of hourly. > Bummer. There are some dumb things done in the code (as most code, mine the worst). They would be better off moving to c++11 (preferably c++14) idioms in many places but that creates a dependency on an appropriate compiler. > Do you also observe the leaking? > I just started watching. Most of the traffic through my instance is repetitive so I'm not expecting to see anything. > However, its /usr/local/libexec/squid/ntlm_smb_lm_auth is broken in > the same way. I had to use the squid27 ntlm_auth binary. > > Anyone have any experience debugging NTLM between proxies and > browsers? > >