[tor-relays] Tor memory leak (0.3.5.7)?
David Goulet
dgoulet at torproject.org
Tue Jun 25 12:41:46 UTC 2019
On 24 Jun (01:49:18), starlight.2018q2 at binnacle.cx wrote:
> Hi,
>
> No leaks. The VM has 1GB, very light for moderate busy relay.
>
> Should be 4GB, perhaps 3DB would do. Settings should include:
>
> AvoidDiskWrites 1
> DisableAllSwap 1
> MaxMemInQueues 1024MB # perhaps 1536MB
>
> My relays run about 800MB to 1.2GB. A nice way to view memory
> usage is with
>
> egrep '^Vm' /proc/$(cat /var/run/tor.pid)/status
>
> which might show something like
>
> VmPeak: 871696 kB
> VmSize: 710152 kB
> VmLck: 710148 kB
> VmHWM: 810872 kB
> VmRSS: 649328 kB
> VmData: 492052 kB
> VmStk: 93 kB
> VmExe: 4704 kB
> VmLib: 104724 kB
> VmPTE: 1044 kB
>
> Notice that current VmSize usage is less than VmPeak,
> indicating that memory was release by glibc malloc.
>
> Tor consumes substantial skbuf memory in the kernel, which
> accounts for some of the difference in reported size for
> VmRSS and VmSize and total memory consumption.
What OS is this running on?
Can you possibly send back a SIGUSR1 log?
Kernel memory leak means we are buffer bloating it with cells... which we
aren't suppose to do these days :S ...
Thanks!
David
--
mtl83aVORGbFMy0uOJnLcNQG64cDwnBUp5hK73imIrw=
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190625/907daea5/attachment.sig>
More information about the tor-relays
mailing list