[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #24806 [Core Tor/Tor]: LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable



#24806: LTS branch leaks memory continuously under stress/attack, requires back-
port of 0.3.2.8-rc fixes to remain viable
--------------------------+------------------------
 Reporter:  starlight     |          Owner:  (none)
     Type:  defect        |         Status:  new
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------

Comment (by starlight):

 In general agree, though seeing the daemon click up 100MB every hour or
 two while under stress/attack causes me to keep an open mind regarding the
 cause.

 After starting 0.3.2.8-rc the relay was still high rated and initially I
 selected the vanilla scheduler.  Memory consumption climbed steadily until
 the consensus rating dropped, holding since at 1.5GB.  Deactivated all
 local activities that could be an influence and memory increased overnight
 from 1.3GB to 1.5GB regardless.  Since then decided to activate KIST
 scheduler after skimming the paper and a glance at the code.

 Will be interesting to see how it looks the next time rating climbs and
 the HSDIR flag is assigned.  Prepared a LSAN instrumented image to run if
 memory consumption takes another unbounded wander.

 Have observed a couple of apparent circuit-extend attacks and it's
 performing better.  Not seeing crypto thread-pair saturate; seeing no
 'assign_to_cpuworker failed" errors and just one "computer too slow" per
 day with a much lower repeat count.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24806#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs