Created on
04-26-2023
06:13 AM
Edited on
11-23-2025
06:30 AM
By
Jean-Philippe_P
| Description | This article describes how to detect and resolve a wad memory leak in object ssl.fts.str.fstr_buffer_bytes. |
| Scope | FortiOS v7.0.8, v7.0.9. |
| Solution |
The wad process has a memory leak on FortiOS v7.0.8 and v7.0.9 in the object ssl.fts.str.fstr_buffer_bytes. The issue occurs when processing SSL/TLS traffic.
High memory usage in this buffer is not necessarily linked to a memory leak. In these scenarios, refer to the article: Technical Tip: High WAD memory due to ssl.fts.str.fstr_buffer_bytes buffer usage.
To confirm the device is matching this issue, run show the memory usage of the user space processes:
diagnose sys top-mem 99
Here, the WAD process with the process ID (PID) 17503 allocated about 1200 MB.
Verify these wad processes are of type worker with commands:
diagnose debug reset
Confirm the wad workers leak memory in object ssl.fts.str.fstr_buffer_bytes:
diagnose wad stats worker | grep fstr_buffer
Repeat the steps from above periodically to observe if memory increases, i.e., after 30 minutes.
Workaround: As a quick workaround, the wad processes can be restarted with the command:
diagnose test application wad 99
Also, find different ways to restart the WAD process and understand the impacts of restarting: Technical Tip: How to restart the WAD process.
This can be automated via the 'config system auto-script' feature: Technical Tip: Automatically restart WAD worker processes.
Solution: The solution is to upgrade to FortiOS versions 7.0.10, 7.2.4, or above.
Related articles: Troubleshooting Tip: WAD memory leak due to WAD process type user-info on firmware v7.0.8 and v7.0.9 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.