<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • PHP CURL內(nèi)存泄露的解決方法

    時間:2024-10-23 13:35:58 PHP 我要投稿
    • 相關推薦

    PHP CURL內(nèi)存泄露的解決方法

      curl配置平淡無奇,長時間運行發(fā)現(xiàn)一個嚴重問題,內(nèi)存泄露!不論用單線程和多線程都無法避免!是curl訪問https站點的時候有bug!

      內(nèi)存泄露可以通過linux的top命令發(fā)現(xiàn),使用php函數(shù)memory_get_usage()不會發(fā)現(xiàn)。

      經(jīng)過反復調(diào)試找到解決辦法,curl配置添加如下幾項解決問題:

      復制代碼 代碼如下:

      [CURLOPT_HTTPPROXYTUNNEL] = true;

      [CURLOPT_SSL_VERIFYPEER] = false;

      [CURLOPT_SSL_VERIFYHOST] = false;

      CURLOPT_HTTPPROXYTUNNEL具體說明stackoverflow上有,直接貼原文:

      Without CURLOPT_HTTPPROXYTUNNEL

      Without CURLOPT_HTTPPROXYTUNNEL : You just use the proxy address/port as a destination of your HTTP request. The proxy will read the HTTP headers of your query, forward your request to the destination (with your HTTP headers) and then write the response to you.

      Example steps :

      1)HTTP GET / sent to 1.1.1.1 (proxy)

      2)1.1.1.1 receive request and parse header for getting the final destination of your HTTP request.

      3)1.1.1.1 forward your query and headers to www.site.com (destination in request headers).

      4)1.1.1.1 write back to you the response receive from www.site.com

      With CURLOPT_HTTPPROXYTUNNEL

      With CURLOPT_HTTPPROXYTUNNEL : You ask the proxy to open a direct binary connection (like HTTPS, called a TCP Tunnel) directly to your destination by doing a CONNECT HTTP request. When the tunnel is ok, the proxy write you back a HTTP/1.1 200 Connection established. When it received your browser start to query the destination directly : The proxy does not parse HTTP headers and theoretically does not read tunnel datas, it just forward it, thats why it is called a tunnel !

      Example steps :

      1)HTTP CONNECT sent to 1.1.1.1

      2)1.1.1.1 receive HTTP CONNECT and get the ip/port of your final destination (header field of HTTP CONNECT).

      3)1.1.1.1 open a TCP Socket by doing a TCP handshake to your destination 2.22.63.73:80 (ip/port of www.site.com).

      4)1.1.1.1 Make a tunnel by piping your TCP Socket to the TCP Socket opened to 2.22.63.73:80and then write you back HTTP/1.1 200 Connection established witch means that your client can now make your query throw the TCP Tunnel (TCP datas received will be transmited directly to server and vice versa).

    【PHP CURL內(nèi)存泄露的解決方法】相關文章:

    JAVA垃圾收集算法與內(nèi)存泄露的解決方法12-04

    PHP中curl的使用實例07-31

    Javascript 閉包引起IE內(nèi)存泄露分析07-05

    PHP的cURL庫有效地抓網(wǎng)頁的技巧08-08

    關于深入PHP內(nèi)存相關的功能特性詳解09-02

    電腦內(nèi)存常見故障及解決方法05-12

    手機內(nèi)存卡故障及解決方法10-10

    電腦內(nèi)存六大故障以及解決方法09-26

    Intel傲騰內(nèi)存是內(nèi)存還是固態(tài)硬盤06-17

    電腦內(nèi)存的作用08-26

    主站蜘蛛池模板: 99视频精品全部在线观看| 老司机亚洲精品影院无码| 中文字幕一区二区三区日韩精品| 国产成人精品免费视频大全麻豆| 伊人精品视频在线| 国产精品成人精品久久久| 98视频精品全部国产| 亚洲精品无码av人在线观看| 久久国产精品视频| 老司机99精品99| 精品无码av一区二区三区| 四虎国产精品永久在线无码| 国产精品亚洲专区无码WEB | 66精品综合久久久久久久| 国产成人精品综合网站| 国产亚洲精品资源在线26u| 日产精品久久久久久久| 亚洲AV成人精品网站在线播放| 精品一区二区三区免费视频| 国产精品玖玖美女张开腿让男人桶爽免费看| 国产欧美久久久精品| 91在线视频精品| 国产精品人人爽人人做我的可爱| 久久精品黄AA片一区二区三区| 亚洲第一极品精品无码久久| 亚洲情侣偷拍精品| 亚洲av无码成人精品区在线播放| 欧美日韩精品系列一区二区三区国产一区二区精品 | 亚洲精品国产精品乱码不卡| 久久久精品日本一区二区三区 | 精品少妇人妻av无码久久| 无码国产精品一区二区免费模式 | 99久久久国产精品免费无卡顿| 国产伦精品免编号公布| 精品久久久久久无码中文字幕一区| 久久精品人人做人人爽97| 精品久久久久久无码专区不卡| 国产精品VA在线观看无码不卡 | 99re热视频这里只精品| 国产精品久久久久影院嫩草| 精品视频在线免费观看|