[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27813 [Core Tor/Tor]: Tor 0.3.4.8 is leaking memory
#27813: Tor 0.3.4.8 is leaking memory
-------------------------------------------------+-------------------------
Reporter: anong | Owner: (none)
Type: defect | Status:
| needs_information
Priority: Very High | Milestone: Tor:
| 0.3.5.x-final
Component: Core Tor/Tor | Version: Tor:
| 0.3.4.8
Severity: Critical | Resolution:
Keywords: regression? memleak oom | Actual Points:
034-backport tor-relay 035-must |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by starlight):
Replying to [comment:30 dgoulet]:
>. . .
>KIST should prevent that in theory but not entirely. Some could always go
as in flushing 1M of cells and only one goes through leaving the rest in
the kernel.
>
>The bigger issue is that we still have cells bypassing the KIST scheduler
that are directly written on the socket. We have several ticket open about
these issues.
Thank you for the update, the details are informative and interesting.
After posting I realized stuck sockets will hide an EOF condition and when
the other side closes EOFs are not detected resulting in a socket leak,
but one cured by the fix. A more carefully read turns up that performance
degradation did result.
Newer kernels account kernel SKBs under the owning process for correct
CGROUP resource control, and graphs above show the leaked memory as "app"
memory.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27813#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs