[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #23722 [Core Tor/Tor]: Somebody should profile a Tor 0.3.1.7 relay



#23722: Somebody should profile a Tor 0.3.1.7 relay
--------------------------+------------------------------------
 Reporter:  arma          |          Owner:  (none)
     Type:  enhancement   |         Status:  new
 Priority:  Medium        |      Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------------

Comment (by Hello71):

 Replying to [comment:5 nickm]:
 > Weird! Was the server seeing much traffic at the time? I'm surprised
 that none of the compression algorithms, digest algorithms, or AES
 appeared on profile.

 well, consensus updates are uncommon, and AES-NI is very fast. suppose
 that you get https://calomel.org/aesni_ssl_performance.html performance,
 then if your relay is 100 megabit/sec and you can do 1700 megabyte/sec
 AES, then by my calculations, you should spend about 0.7% CPU time in AES.
 coincidentally, we have symbols in libcrypto.so at 0.60% and 0.54%.
 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1598529 is probably
 relevant, upgrading your kernel will probably help.

 as I said on IRC, KIST incidentally moderately improves CPU usage by
 calling epoll_ctl at a reasonable rate instead of the ridiculousness that
 was before.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23722#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs