Leak Suspects
System Overview
Leaks 
Overview

Problem Suspect 1
One instance of org.jivesoftware.openfire.LocalSessionManager
loaded by org.jivesoftware.openfire.starter.JiveClassLoader @ 0x7f20f400cb78
occupies 35,172,162,568 (94.15%) bytes. The memory is accumulated in one instance of java.util.concurrent.ConcurrentHashMap$Node[]
, loaded by <system class loader>
, which occupies 35,172,162,024 (94.15%) bytes.
Thread java.lang.Thread @ 0x7f2119037b00 socket_c2s-thread-953
has a local variable or reference to org.jivesoftware.openfire.session.LocalClientSession @ 0x7f2cb919b058
which is on the shortest path to java.util.concurrent.ConcurrentHashMap$Node[2097152] @ 0x7f26fa000000
. The thread java.lang.Thread @ 0x7f2119037b00 socket_c2s-thread-953 keeps local variables with total size 106,168 (0.00%) bytes.
Significant stack frames and local variables
- org.jivesoftware.openfire.net.SASLAuthentication.handle(Lorg/jivesoftware/openfire/session/LocalSession;Lorg/dom4j/Element;)Lorg/jivesoftware/openfire/net/SASLAuthentication$Status; (SASLAuthentication.java:425)
- org.jivesoftware.openfire.session.LocalClientSession @ 0x7f2cb919b058 retains 1,376 (0.00%) bytes
The stacktrace of this Thread is available. See stacktrace. See stacktrace with involved local variables.
Keywords
- org.jivesoftware.openfire.LocalSessionManager
- org.jivesoftware.openfire.starter.JiveClassLoader
- java.util.concurrent.ConcurrentHashMap$Node[]
- org.jivesoftware.openfire.net.SASLAuthentication.handle(Lorg/jivesoftware/openfire/session/LocalSession;Lorg/dom4j/Element;)Lorg/jivesoftware/openfire/net/SASLAuthentication$Status;
- SASLAuthentication.java:425