[Mono-bugs] [Bug 71001][Cri] Changed - xsp.exe virtual size grows
without bound -- large messages
bugzilla-daemon at bugzilla.ximian.com
bugzilla-daemon at bugzilla.ximian.com
Tue Jun 7 21:46:08 EDT 2005
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by gonzalo at ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=71001
--- shadow/71001 2005-06-07 20:24:38.000000000 -0400
+++ shadow/71001.tmp.21774 2005-06-07 21:46:08.000000000 -0400
@@ -1,13 +1,13 @@
Bug#: 71001
Product: Mono: Runtime
Version: unspecified
OS: SLES 9
OS Details: AMD-64
-Status: REOPENED
-Resolution:
+Status: RESOLVED
+Resolution: WONTFIX
Severity: Unknown
Priority: Critical
Component: misc
AssignedTo: mono-bugs at ximian.com
ReportedBy: jrodman at ximian-bugzilla.spamportal.net
QAContact: mono-bugs at ximian.com
@@ -145,6 +145,31 @@
The 1.7GB of memory usage aside, our appliance stays up for long
periods of time and the other services that run on the appliance need
all the memory they can get.
Thanks in advance, please let me know if there is anything else I can do!
+
+------- Additional Comments From gonzalo at ximian.com 2005-06-07 21:46 -------
+Uploading a large file without splitting it is a bad idea.
+
+The whole 46MB chunk is kept in memory and copied afterwards to do
+whatever you do (+filters, +...). We need to keep it like that to
+behave as MS. Btw, you should realize that uploading big files like
+that is a bad idea because you had to increase the request size limit
+in machine.config/web.config.
+
+Those *big* buffers with some help of the garbage collector are the
+cause of the 'memory leak' you're seeing.
+
+Two possible solutions are redirecting the POST at apache level
+(rewrite?) or if your customer is not using a web browser but a custom
+ application, upload the file in smaller chunks.
+
+I've tried uploading large files in 4MB chunks from multiple clients
+at the same time and the memory usage stayed bounded.
+
+Oh, and, as that buffer is allocated when reading the request, if you
+set that limit too high, you will be subject to denial of service
+attacks by anyone that posts a big content length a few times...
+
+
More information about the mono-bugs
mailing list