From owner-freebsd-questions@FreeBSD.ORG Thu Sep 25 11:35:50 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 45E57DA4 for ; Thu, 25 Sep 2014 11:35:50 +0000 (UTC) Received: from btw.pki2.com (btw.pki2.com [IPv6:2001:470:a:6fd::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E4AF1EA1 for ; Thu, 25 Sep 2014 11:35:49 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) by btw.pki2.com (8.14.9/8.14.9) with ESMTP id s8PBZYSW008580; Thu, 25 Sep 2014 04:35:34 -0700 (PDT) (envelope-from freebsd@pki2.com) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=pki2.com; s=pki2; t=1411644934; bh=WIh+QwzzDxvjLFWyB53xGtoJS+saqZ7lJx+PF5zcHEg=; h=Subject:From:To:Cc:In-Reply-To:References:Date; b=PU1QQEg378LGo3IaHMgTnf3+xAqqz9tP1uC3Mpg8WbvOt9h5l5aNDDIjdkllDOicM HubpmAC3DhCTo/KlrnWYfSqcMZngVywvhZH8nrACWGDhwC0UNuUBTalM3JVee/SDav q/IX+PLdWtclyC3nw3Zrmswaoll+OAzgJfiByi7wXzyKp0NQCZhPY5jzBtucT5AxVM I1U9a8PRq6EvUioqxwr4kNqg70CvviUTJctZu22PxklS1OcuCrwRghQaynCyGosylQ pXhJ5HrJlODjlR0Vc1CknzK6h5M0sckTR3VAADG7Pou4wcdiL0BFZZR39wBs8a2m0F 4+nDeh9s1Iyog== Subject: Re: squid-3.4.8_1 leaking memory From: Dennis Glatting To: Victor Sudakov In-Reply-To: <20140925110428.GA79336@admin.sibptus.tomsk.ru> References: <20140925045657.GA71070@admin.sibptus.tomsk.ru> <1411642468.3895.847.camel@btw.pki2.com> <20140925110428.GA79336@admin.sibptus.tomsk.ru> Content-Type: text/plain; charset="ISO-8859-1" Date: Thu, 25 Sep 2014 04:35:33 -0700 Message-ID: <1411644933.3895.862.camel@btw.pki2.com> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit X-SoftwareMunitions-MailScanner-Information: Dennis Glatting X-SoftwareMunitions-MailScanner-ID: s8PBZYSW008580 X-SoftwareMunitions-MailScanner: Found to be clean X-MailScanner-From: freebsd@pki2.com Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Sep 2014 11:35:50 -0000 On Thu, 2014-09-25 at 18:04 +0700, Victor Sudakov wrote: > Dennis Glatting wrote: > > > > > > squid-3.4.8_1 seems to be leaking memory heavily. Its SIZE and RES are > > > growing several MB per minute until eventually swapping begins. > > > > > > Is anyone using it? Have you encountered this problem? > > > > > > The relevant entries in squid.conf are: > > > > > > cache_mem 128 MB > > > cache_dir ufs /webcache/cache 512 16 256 > > > memory_pools off # neither "on" nor "off" have any effect on leaking. > > > > > > As you see, the memory requirements should be rather modest. > > > > > > Running on 8.4-RELEASE-p16 i386. > > > > > > > The Squid Cache web site DOES NOT list 3.4.8 as the stable release, > > rather 3.4.7 is listed as the stable release. > > Well, what is 3.4.8 doing in the ports collection then? Someone was > too quick to adopt it as www/squid ? > > > There are also 18 change > > sets listed for 3.4.7 and three for 3.4.8. > > Is there a quick and easy way to to downgrade www/squid to 3.4.7? > > Tonight I'll be trying to replace it with www/squid33 anyway. > > > > > I did not follow the thread where we went from 3.4.7 to 3.4.8. > > > Looks like the problem with 3.4.7 was Kerberos (no surprise). https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193717 The SVN log says: btw> svnlite log -r 368828 /usr/ports/ ------------------------------------------------------------------------ r368828 | madpilot | 2014-09-22 01:40:39 -0700 (Mon, 22 Sep 2014) | 4 lines Add CPE info to squid ports. Requested by: des@ ------------------------------------------------------------------------