[tor-bugs] #24806 [Core Tor/Tor]: LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jan 8 12:45:44 UTC 2018
#24806: LTS branch leaks memory continuously under stress/attack, requires back-
port of 0.3.2.8-rc fixes to remain viable
--------------------------+------------------------
Reporter: starlight | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------+------------------------
Comment (by starlight):
In general agree, though seeing the daemon click up 100MB every hour or
two while under stress/attack causes me to keep an open mind regarding the
cause.
After starting 0.3.2.8-rc the relay was still high rated and initially I
selected the vanilla scheduler. Memory consumption climbed steadily until
the consensus rating dropped, holding since at 1.5GB. Deactivated all
local activities that could be an influence and memory increased overnight
from 1.3GB to 1.5GB regardless. Since then decided to activate KIST
scheduler after skimming the paper and a glance at the code.
Will be interesting to see how it looks the next time rating climbs and
the HSDIR flag is assigned. Prepared a LSAN instrumented image to run if
memory consumption takes another unbounded wander.
Have observed a couple of apparent circuit-extend attacks and it's
performing better. Not seeing crypto thread-pair saturate; seeing no
'assign_to_cpuworker failed" errors and just one "computer too slow" per
day with a much lower repeat count.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24806#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list