Closed ghost closed 7 years ago
could we get a summary of the leaks detected by valgrind?
so, 4M. We need detailed leaks
Ver 2.12 real hardware PC, 2 GB RAM, Core2Duo E6750 @ 2.66GHz Debian Jessie 32 bit uptime 18 days 9 hours
ipv4 = false ipv6 = true ifname6 = tun0 (pc behind nat, real ipv6 by vpn) nat = false (i have real ipv6, ipv4 disabled) bandwidth = 20480 notransit = false floodfill = true
top
Tasks: 103 total, 1 running, 102 sleeping, 0 stopped, 0 zombie
%Cpu(s): 10,5 us, 0,2 sy, 0,0 ni, 89,3 id, 0,0 wa, 0,0 hi, 0,0 si, 0,0 st
KiB Mem: 2068300 total, 1723868 used, 344432 free, 69244 buffers
KiB Swap: 0 total, 0 used, 0 free. 669128 cached Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
19838 i2pd 20 0 922064 768588 7448 S 20,6 37,2 3357:30 i2pd
About 750MB. Is it memory leak?
~# netstat -nap | grep i2pd | grep "tcp " | wc -l 543 IPv4 disabled in config. Why tcpv4 connections established? May be open issue? ~# netstat -nap | grep i2pd | grep "tcp6" | wc -l 1486
NTCP 672, SSU 0, SSU6 about 25 Transit tunnels 138
@LLE8 yeh it looks like a leak
There is, but I couldn't catch it using valgrind. @Barack0bama seems able to, so we need more detailed output
I got some disparity when testing with 32 bits and 64, the result above is for 32 bits, while for 64 I get half less memory leaks. Anyway here is the full output (for 64): https://gist.github.com/Barack0bama/e591577ddb4b875f0c49dca30ab90e7c
can you try to build with -g ?
https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-289239570 uptime 22 days 2 hours
top - 16:43:22 up 89 days, 5:36, 1 user, load average: 0,16, 0,15, 0,19
Tasks: 103 total, 1 running, 102 sleeping, 0 stopped, 0 zombie
%Cpu(s): 4,8 us, 0,0 sy, 0,0 ni, 95,2 id, 0,0 wa, 0,0 hi, 0,0 si, 0,0 st
KiB Mem: 2068300 total, 1821752 used, 246548 free, 69556 buffers
KiB Swap: 0 total, 0 used, 0 free. 630148 cached Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
19838 i2pd 20 0 1062724 907476 7448 S 8,6 43,9 3997:18 i2pd
About 900MB
Это все еще 2.12? У меня транк стоит - стабильно 19 мегов почти неделю.
да, 2.12,
Убью его сегодня
Заметил вот что ~# netstat -nap | grep "tcp " | grep i2pd | grep EST | wc -l 334 т.е. 334 установленных соединения по tcp4 несмотря на то, что в i2pd.conf ipv4 = false Имеет смысл открыть issue на эту тему?
да можно открыть что все равно создаются по v4. Кстати как на той впс обстоят дела с AVX и AESNI?
На которой сожрано 900 метров? Никак. Это не впс, а реальный железный комп с древним процом и 2 ГБ ОЗУ Куски из cpuinfo
cpu family : 6 model : 15 model name : Intel(R) Core(TM)2 Duo CPU E6750 @ 2.66GHz
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx lm constant_tsc arch_perfmon pebs bts aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm lahf_lm tpr_shadow vnmi flexpriority dtherm
эти https://itldc.com/en/vds/ говорят, что нет и вряд ли возможно говорят Не все инструкции физического CPU мы преносим в виртуальные fpu de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pse36 clflush mmx fxsr sse sse2 syscall nx lm nopl pni cx16 hypervisor lahf_lm
Я правильно понял, что для несерверных процессоров intel поддержка AES есть в i5 и i7?
Насчет aes и avx эти https://www.ihor.ru/ ответили так
Да, должны работать. apt-get install lshw lshw -class processor
может попробую
У меня впс хоть и x86 но оба есть. В последнем AESNI есть, а AVX нету. Но все равно придется пересобрать вручную ибо .deb пакеты собираются без них.
Supporting the off-topic, @orignal @LLE8 If there is interest, I currently use a rather cheap Time4VPS service (my friend's referral link), and the CPU info lists the following flags:
product: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz ... fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good xtopology nonstop_tsc aperfmperf cpuid_faulting pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 fma cx16 xtpr pdcm pcid dca sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm ida arat epb pln pts dtherm tpr_shadow vnmi flexpriority ept vpid fsgsbase bmi1 avx2 smep bmi2 erms invpcid cqm xsaveopt cqm_llc cqm_occup_llc
I am not sure what they mean though.
AVX lets you operate with 32 bytes at the time, and AVX2 with 64
@v2e bandwidth is too small on cheap XS and S plans OpenVZ
@orignal You mean I should use valgrind with i2pd compiled with -g?
Yes
ибо .deb пакеты собираются без них
Где и что дописать, чтобы deb пакеты собирались с ними (avx и aes)? Или судя по Makefile и Makefile.linux нужно всего лишь собирать на процессоре с их поддержкой? И заодно в каком месте опцию -g добавить лучше всего?
Где и что дописать, чтобы deb пакеты собирались с ними (avx и aes)?
@LLE8 удалить патч debian/patches/01-tune-build-opts.patch
И заодно в каком месте опцию -g добавить лучше всего?
В Makefile.linux Если имеется в виду для deb, то скорее всего сборщик его проигнорирует.
А там похоже по умолчанию -g CXXFLAGS ?= -g -Wall -Wextra -Wno-unused-parameter -pedantic -Wno-misleading-indentation
В консоли после запуска debuild такое g++ -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -std=c++11 -D_GLIBCXX_USE_NANOSLEEP=1 -fPIC -c -o obj/Datagram.o Datagram.cpp
~/src/i2pd$ file i2pd i2pd: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=43b56f996bca627790479739454106991d968e6b, not stripped
valgrind --tool=memcheck --leak-check=full --show-leak-kinds=all /usr/sbin/i2pd_notstripped свежий транк, Debian Jessie, 64 bit putty_log1.zip.txt переименовать в putty_log1.zip (странный баг здесь, zip не загружается) putty_log1.zip.txt
Вот это серьезно by 0x543F28: DecodePoint (Signature.cpp:377) ==11244== by 0x543F28: DecodePublicKey (Signature.cpp:99) ==11244== by 0x543F28: i2p::crypto::EDDSA25519Verifier::EDDSA25519Verifier(unsigned char const*) (Signature.cpp:448) и это by 0x545282: Sum (Signature.cpp:182) ==11244== by 0x545282: i2p::crypto::Ed25519::Ed25519() (Signature.cpp:67) ==11244== by 0x543B40: i2p::crypto::GetEd25519() (Signature.cpp:434)
Этот https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-289239570 сожрал более гигабайта (в top 1.108 G) и еще не упал. Не исключаю того, что такой баг из-за аппаратных проблем с диском, на который он пишет лог. Флибуста и zzz открываются, но не с первого раза. Убиваю?
Да конечно, убивать. Гиг памяти это никуда не годится
DEL, не то и не туда
В том логе никаких утечек кроме неправильной очистки progarm_options и openssl при завершении работы
Предыдущий лог неправильныый был, как мне кажется, т.к. запускать надо было от рута. Не то и не туда Здесь есть что-то интересное на ваш взгляд? Вчерашний транк Debian Jessie 32 bit
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2017.04.05 15:10:10 =~=~=~=~=~=~=~=~=~=~=~=
root@kw725:/tmp#
root@kw725:/tmp# valgrind --tool=memcheck --leak-check=full --show-leak-kinds=all /usr/sbin/i2pd_notstripped
valgrind --tool=memcheck --leak-check=full --show-leak-kinds=all /usr/sbin/i2pd_notstripped
==22528== Memcheck, a memory error detector
==22528== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==22528== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info
==22528== Command: /usr/sbin/i2pd_notstripped
==22528==
15:11:10@881/info - Log: min messages level set to info
15:11:10@881/info - i2pd v2.12.0 starting
15:11:17@881/info - Daemon: bandwidth set to 'low'
15:11:17@881/info - Daemon: using system limit in 65526 max open files
15:11:17@881/info - Daemon: starting NetDB
15:11:17@881/warn - Family: Can't load family certificates from /root/.i2pd/certificates/family
15:11:17@881/info - NetDb: 340 routers loaded (255 floodfils)
15:11:17@881/info - Daemon: starting Transports
15:11:18@881/info - NTCP: Start listening TCP port 24203
15:11:18@881/info - Transports: Start listening UDP port 24203
15:11:18@881/info - Daemon: Transports started
15:11:18@881/info - Daemon: starting HTTP Server at 127.0.0.1:7070
15:11:18@881/info - Daemon: starting Tunnels
15:11:18@881/info - Daemon: starting Client
15:11:19@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:19@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:20@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:20@403/warn - SSU: Missing fragments from 0 to 0 of message 1951694319
15:11:20@122/info - NetDb: Publishing our RouterInfo to nDDt. reply token=619136354
15:11:20@122/info - NetDb: Publishing our RouterInfo to nygz. reply token=750414867
15:11:20@122/info - NetDb: exploring new 2 routers ...
15:11:20@403/warn - SSU: Missing fragments from 0 to 0 of message 1363338074
15:11:21@436/warn - Profiling: no profile yet for wfqpeYpl4EMOi~8t15xSGPv8Grz1bI8~3C3-7nnKL7s=
==22528== Thread 8:
==22528== Use of uninitialised value of size 4
==22528== at 0x40A908F: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90A0: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90BD: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90D8: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90F5: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9105: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9143: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A914D: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
15:11:21@403/warn - SSU: Missing fragments from 0 to 0 of message 2012292918
15:11:22@881/info - Addressbook: using index file /root/.i2pd/addressbook/addresses.csv
15:11:22@881/info - Addressbook: 416 addresses loaded from storage
15:11:22@881/info - Clients: starting HTTP Proxy at 127.0.0.1:4444
15:11:22@403/warn - SSU: MAC verification failed 58 bytes from 188.138.90.139:11354
15:11:22@881/info - Clients: starting SOCKS Proxy at 127.0.0.1:4447
15:11:22@403/warn - SSU: MAC verification failed 50 bytes from 203.206.23.146:37486
15:11:22@881/warn - Clients: Can't read /root/.i2pd/tunnels.conf: /root/.i2pd/tunnels.conf: cannot open file
15:11:22@403/warn - SSU: MAC verification failed 56 bytes from 58.179.42.158:34633
15:11:23@403/warn - SSU: session with 95.221.60.137:31107 was not established after 5 seconds
15:11:23@403/warn - SSU: session with 217.84.201.61:24688 was not established after 5 seconds
15:11:24@436/warn - Profiling: no profile yet for pP05J5FKMyyMzUAOCvXIyAbFP1lZvd7GTelGOZ7kgZk=
15:11:25@436/warn - Profiling: no profile yet for bXDtIDXrGm43lane-7Ni7VAd66fVfRDgWH6eUwSMz98=
15:11:25@122/info - NetDb: RouterInfo updated: XOjyoCCSiQHjWveIma56~Ykyrag2s5y~8tDORLktciw=
15:11:26@122/info - NetDb: RouterInfo updated: 6IMcDkx6PsK3VA~M~jurHMxOlzfiaPGzsvSp38vkoaw=
15:11:26@436/warn - Profiling: no profile yet for RmXMRcG95ygtgLtXui~Aiy2K7hTO82kBKUXQ~O2k2DE=
15:11:27@436/warn - Profiling: no profile yet for ytqtMRXLkEFGDP0EMZp3EymbzGf0upUzzjyr1ivv0B0=
15:11:27@122/info - NetDb: RouterInfo updated: rasoPP6VStBKX0udc6kj-EKPRtnrhcDodSU0EEqnRoA=
15:11:27@436/warn - Profiling: no profile yet for JmfCj7owNjV9A0et9P~daE9VC7fDrL~iGJCi5CYjVo8=
15:11:27@825/info - NTCP: Connect error No route to host
15:11:27@436/warn - Profiling: no profile yet for x81lbdDqMuGyY~eyCsilTWnZlkdESprZvhg2rD~59S4=
15:11:28@436/warn - Profiling: no profile yet for 7sZFPSyrDwM-Pg9hTUjLJCgBDfqTG1AfXJ-ntQnTaJY=
15:11:28@436/warn - Profiling: no profile yet for 6YS-xWg3EajEij2YK54SV9yKVn5NCI96EyNLdDdAUuk=
15:11:28@436/warn - Profiling: no profile yet for vedjOA1yiOjwmaHmX0wIff-2tjghIUdOzlmd6hnbUB8=
15:11:28@825/info - NTCP: Phase 2 read error: Connection reset by peer. Wrong ident assumed
15:11:29@436/warn - Profiling: no profile yet for qCAj84Z9VTpmQSdYKSUqc56QMDdrgLCkCIHcz8dCj-M=
15:11:29@122/info - NetDb: RouterInfo updated: u842uI4QpU87WKL1CvW~Uv10vT3XCUoNIJw-1lVrYp4=
15:11:29@825/info - NTCP: Phase 2 read error: End of file. Wrong ident assumed
15:11:29@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:30@436/info - I2NP: Outbound tunnel 3980233440 has been created
15:11:30@825/info - NTCP: Phase 2 read error: End of file. Wrong ident assumed
15:11:30@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:30@403/warn - SSU: Missing fragments from 0 to 0 of message 1729305124
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90B0: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90CA: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A90E8: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9113: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9128: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9139: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
15:11:30@403/warn - SSU: Missing fragments from 0 to 0 of message 387353421
15:11:30@122/info - NetDb: RouterInfo updated: x~lsWsk1Il4YM3N35EZF5C06vd13WFWgB8Cz5GGpjRM=
15:11:31@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:31@403/warn - SSU: Missing fragments from 0 to 0 of message 1241728779
15:11:31@122/info - NetDb: RouterInfo updated: 128Xb4Imey0tjV4IbWpshJ~fHzg3ic8zNaeyXgk-iu4=
15:11:32@122/info - NetDb: RouterInfo updated: JmfCj7owNjV9A0et9P~daE9VC7fDrL~iGJCi5CYjVo8=
15:11:32@825/info - NTCP: Not connected in 5 seconds
15:11:32@403/warn - SSU: session with 65.92.209.46:37860 was not established after 5 seconds
15:11:32@385/info - Transports: No NTCP or SSU addresses available
15:11:33@825/info - NTCP: Connect error Operation canceled
15:11:34@122/info - NetDb: RouterInfo updated: pP05J5FKMyyMzUAOCvXIyAbFP1lZvd7GTelGOZ7kgZk=
15:11:34@122/info - NetDb: RouterInfo updated: FBeNAy0CR1d8-7esSzvyS7lzwNQiP6lNLz-K3sKqwZI=
15:11:34@825/info - NTCP: Not connected in 5 seconds
15:11:34@825/info - NTCP: Not connected in 5 seconds
15:11:35@122/info - NetDb: RouterInfo updated: qCAj84Z9VTpmQSdYKSUqc56QMDdrgLCkCIHcz8dCj-M=
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@122/warn - NetDbReq: No inbound tunnels
15:11:35@122/warn - NetDbReq: No outbound tunnels
15:11:35@825/info - NTCP: Connect error Operation canceled
15:11:35@825/info - NTCP: Connect error Operation canceled
15:11:35@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:35@825/info - NTCP: Not connected in 5 seconds
15:11:35@403/warn - SSU: Missing fragments from 0 to 0 of message 3798981229
15:11:36@122/info - NetDb: RouterInfo added: XpSz~8omq4CPxo8sEbqGulC~zHGoncHhofr5clW5lJ4=
15:11:36@122/info - NetDb: RouterInfo updated: IyX6L1Yu95C0nLyKuRqXp6SxKxE0H2klval~5d1J0TI=
15:11:36@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:36@825/info - NTCP: Connect error Operation canceled
15:11:37@122/info - NetDb: RouterInfo updated: gp0MDGnGIuKHv4pDmlxcvEAg4a-auwpIfaWYaEQhzi0=
15:11:37@403/warn - SSU: Missing fragments from 0 to 0 of message 2136091536
15:11:37@122/info - NetDb: RouterInfo added: LOVd1hJKxG52DYBYw6QlzLwqfLBBhBlQ-Ta6KEFAJCM=
15:11:37@403/warn - SSU: session with 50.39.169.98:21017 was not established after 5 seconds
15:11:37@122/info - NetDb: RouterInfo added: LJ1wGw167hXU86XkRS52vJzxEGsROTVJ90ruhUvlIek=
15:11:37@385/info - Transports: No NTCP or SSU addresses available
15:11:38@122/info - NetDb: RouterInfo added: LDA0ojJNuNkC700tc2C2OauQFS8MqhWiHsj6cSGLx8M=
15:11:38@436/warn - Profiling: no profile yet for xczzyu3oC9lknYHta6nc9dPwAvjva81ohtMkBWWgGEY=
15:11:38@122/info - NetDb: RouterInfo updated: qyVVybLpsXTUGLzk9CzrvgyHXl3MJ07Ag73XELUo88k=
15:11:38@122/info - NetDb: RouterInfo updated: 6YS-xWg3EajEij2YK54SV9yKVn5NCI96EyNLdDdAUuk=
15:11:39@436/warn - Profiling: no profile yet for gmXHxsF-gm23Ueob-VN7DQ1tJuPzNIQNhMb8iWZHgd8=
15:11:39@122/info - NetDb: RouterInfo added: XtxCW946w1KQCncVXc5VOWwDIRtrGWEFcGQAAwoQtsg=
15:11:39@436/warn - Profiling: no profile yet for qj6fyQ4hOJX17rWGpFI0jkYvIcj6fdyYwL-eZFrDzoI=
15:11:39@122/info - NetDb: RouterInfo updated: vT3DLx-bAR5mv0w0fmT9Tvx0FeLwX2O5MKz4yivmc3Y=
15:11:39@403/warn - SSU: session with 81.66.92.188:21791 was not established after 5 seconds
15:11:39@385/info - Transports: No NTCP or SSU addresses available
15:11:40@122/info - NetDb: RouterInfo updated: BzjG6Ydj80mRo569Diw6pRfuSGrXL0ZNwD6ye-fsEEc=
15:11:40@436/warn - Profiling: no profile yet for qyVVybLpsXTUGLzk9CzrvgyHXl3MJ07Ag73XELUo88k=
15:11:40@403/warn - SSU: Duplicate fragment 0 of message 1729305124, ignored
15:11:40@436/warn - Profiling: no profile yet for BzjG6Ydj80mRo569Diw6pRfuSGrXL0ZNwD6ye-fsEEc=
15:11:41@436/warn - Profiling: no profile yet for sThJOVIGCV~5c7P-LmtIXMW142apjfWwk8~GffpspaY=
15:11:41@436/warn - Profiling: no profile yet for ~o6TGlUGiQ82RTMac7PKafEbrhntaOKAe~O49yjfH5U=
15:11:41@436/warn - Profiling: no profile yet for JP8OB9MzrjZAaOCFjZM7t~p7BBogGz1K3sZoIXO5ikc=
15:11:41@436/warn - Profiling: no profile yet for LyJu6R66nRlg~Mtamqmi2PMK8XDrYpWBz~l6KwWSeno=
15:11:41@122/info - NetDb: RouterInfo updated: CWDKBQncAPdm0y1dMUm2gxDs6MvCJTw11czeNzA5okg=
15:11:42@436/warn - Profiling: no profile yet for 2HYvQhKLZjp6xQzPOHlEXmGY-mGpakaL0k4M6kOVwpE=
15:11:42@436/warn - Profiling: no profile yet for gmkS6VOOROF0in94gLKRqLBlp0ztLOGcOTK5oe~aJ7g=
15:11:43@436/warn - Profiling: no profile yet for gzD5-5OB7SrI6hHn~4bvi3RVsrHhRosbs4eHEBzhKcg=
15:11:43@436/info - I2NP: Inbound tunnel 296393674 has been created
15:11:43@436/info - I2NP: Inbound tunnel 107263847 has been declined
15:11:43@436/info - I2NP: Outbound tunnel 1393656979 has been created
15:11:43@436/info - I2NP: Inbound tunnel 3130285609 has been declined
15:11:43@436/info - I2NP: Inbound tunnel 874433626 has been created
15:11:44@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:44@436/info - I2NP: Outbound tunnel 2328970940 has been created
15:11:48@825/info - NTCP: Not connected in 5 seconds
15:11:48@825/info - NTCP: Connect error Operation canceled
15:11:48@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:48@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:49@403/warn - SSU: Missing fragments from 0 to 0 of message 1263107169
15:11:49@122/info - NetDb: RouterInfo updated: ~lzi3Gk2LRWm9iVwIc5Ivun4bovHbCVCqtgeJCMH18s=
15:11:49@403/warn - SSU: Missing fragments from 0 to 0 of message 1925962022
15:11:50@436/warn - Profiling: no profile yet for vYGQJ0U5pg~uYKsU8hGh2sGgzLGSvnvoE1VxSXPOHSA=
15:11:50@436/warn - Profiling: no profile yet for qJpd0JVLk~m1cDsY5f5wcgXyEUwR3MreOL~kDHa5f1U=
15:11:50@436/warn - Profiling: no profile yet for vOrr3H0k22pcPWlxNUT8~oar9P7ptbsOSV22kCQYF7I=
15:11:50@436/warn - Profiling: no profile yet for JrJAJBJZr5acV07yhR27cRdTjNpObroLUoOR9BgSxHU=
15:11:50@436/warn - Profiling: no profile yet for 2Gl~2Whc7~TmP3vAnoESPBtXNaqWlqw-SKfSkHhMebI=
15:11:50@436/warn - Profiling: no profile yet for VEFNBeJwngTWfV4Ifhz6s~9gw7F6W4J3UnpKAFXoH2E=
15:11:51@122/info - NetDb: exploring new 2 routers ...
15:11:51@436/warn - Profiling: no profile yet for jnr7g-9xeGrdUwKReR6sNpmECtv29pKKIzQ3XfgIQ1Y=
15:11:52@436/warn - Profiling: no profile yet for L120calbriU9d88U5ilMV0wYXDlo-LqXfB~29pzV0AI=
15:11:53@825/info - NTCP: Phase 2 read error: End of file. Wrong ident assumed
15:11:53@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:54@122/info - NetDb: RouterInfo updated: vOrr3H0k22pcPWlxNUT8~oar9P7ptbsOSV22kCQYF7I=
15:11:54@403/warn - SSU: Missing fragments from 0 to 0 of message 2417286109
15:11:54@436/warn - Profiling: no profile yet for XpSz~8omq4CPxo8sEbqGulC~zHGoncHhofr5clW5lJ4=
15:11:55@436/warn - Profiling: no profile yet for Fr9BHE3QO5iqjIT52f59RXuYfoGEzKbBX~DWWa13rik=
15:11:56@436/warn - Profiling: no profile yet for VWKuzb~09nPBVUuw8lEfb9O~A~cOjIFfOVWlG5TR-Js=
15:11:56@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:56@436/info - I2NP: Outbound tunnel 4254313143 has been created
15:11:56@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:56@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:56@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:56@436/info - I2NP: Outbound tunnel 749032280 has been created
15:11:56@436/info - I2NP: Outbound tunnel 3924377620 has been created
15:11:56@436/info - I2NP: Outbound tunnel 2144895143 has been created
15:11:57@122/info - NetDb: RouterInfo added: vYolAbjnbCKvO8Cyag0IuVJXFHpODYma3~HC6pj0kEI=
15:11:57@825/info - NTCP: Phase 2 read error: End of file. Wrong ident assumed
15:11:57@122/info - NetDb: RouterInfo added: vaxmbC4rqLIGuBhr45vewP6ROpRL58khlycu0Odd6Ow=
15:11:57@403/info - SSU: Our external address is 213.79.117.146:24203
15:11:57@403/warn - SSU: Missing fragments from 0 to 0 of message 3116644229
15:11:58@122/info - NetDb: RouterInfo added: Jqm8Eso6hJyjhsbudbW6TVMf-baXcgFQskQtN2ura28=
15:11:58@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:11:58@436/info - I2NP: Outbound tunnel 727407898 has been created
15:12:00@403/warn - SSU: message 1729305124 was not completed in 30 seconds, deleted
15:12:01@436/info - I2NP: Inbound tunnel 4087744330 has been created
15:12:02@122/info - NetDb: RouterInfo added: va4bFksJg0PqosbOL7RFU1UTlPOB54vGEpZ-fFbXP7s=
15:12:05@436/warn - Profiling: no profile yet for JrjtFsVYzSOOffc2IyzIlRqoM5LDulJPy220cYtLMlw=
15:12:06@436/warn - Profiling: no profile yet for UqhIurP2ndYNIz7cXzlSol6509n6DDa-8JXlkIWhSFI=
15:12:06@436/warn - Profiling: no profile yet for bVYs89K6eC2t7UCoYZ~xAM2TyCFpT8W0amXlgsYM-4g=
15:12:06@436/warn - Profiling: no profile yet for wIQOAOIkQJsPQFkGc5W0Wv9BYQJ5khH~UIrZKS2XFAM=
15:12:08@436/info - I2NP: Inbound tunnel 531530350 has been created
15:12:08@436/info - I2NP: Inbound tunnel 1181333730 has been created
15:12:09@436/info - I2NP: Inbound tunnel 2397385764 has been created
15:12:18@403/info - SSU: Our external address is 213.79.117.146:24203
15:12:18@403/warn - SSU: Missing fragments from 0 to 0 of message 2408556315
15:12:19@403/info - SSU: message has not been ACKed after 5 attempts, deleted
15:12:19@403/info - SSU: message has not been ACKed after 5 attempts, deleted
15:12:20@436/warn - Profiling: no profile yet for vPyE108cwcuVYkACv3c6O3z5CcFKdfL6OeAqs~O2B1Q=
15:12:20@436/warn - Profiling: no profile yet for XOjyoCCSiQHjWveIma56~Ykyrag2s5y~8tDORLktciw=
15:12:20@436/warn - Profiling: no profile yet for LJ1wGw167hXU86XkRS52vJzxEGsROTVJ90ruhUvlIek=
15:12:21@436/warn - Profiling: no profile yet for jxfxKEhSFDNVwbN~aX0Dj621JJ3IoMUtX5f2KCoYC6E=
15:12:21@436/warn - Profiling: no profile yet for Jqm8Eso6hJyjhsbudbW6TVMf-baXcgFQskQtN2ura28=
15:12:22@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:12:22@436/warn - TunnelMessage: I2NP message size 1078 is not enough
15:12:22@436/info - I2NP: Outbound tunnel 1197570347 has been declined
15:12:22@436/info - I2NP: Outbound tunnel 3978458437 has been created
15:12:22@436/info - I2NP: Inbound tunnel 1951923413 has been created
15:12:33@122/info - NetDb: saved 28 new/updated routers
15:12:33@122/info - NetDb: deleting 4 unreachable routers
==22528== Thread 3:
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA64C: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA654: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA70E: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA718: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA65F: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA670: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA680: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA68D: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6AE: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6C2: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6E3: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6F9: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA707: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA69D: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6B8: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40AA6D2: _sse_AES_decrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Thread 6:
==22528== Use of uninitialised value of size 4
==22528== at 0x40A9084: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
==22528== Use of uninitialised value of size 4
==22528== at 0x40A907C: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0)
==22528==
15:12:33@122/info - NetDb: exploring new 2 routers ...
15:12:34@122/info - NetDb: RouterInfo added: JFiV2AFr7e1uyEbijQQt-ynnoacLRKgNdOfO3tRWkyo=
Еще один запуск того же транка, завершилось через некоторое время после однократного нажатия ctrl+c ==22750== LEAK SUMMARY: ==22750== definitely lost: 3,900 bytes in 2 blocks ==22750== indirectly lost: 148,454 bytes in 47 blocks ==22750== possibly lost: 131,072 bytes in 2 blocks ==22750== still reachable: 18,312 bytes in 133 blocks ==22750== suppressed: 0 bytes in 0 blocks putty32.zip.txt
Такое ощущение что остановилось где то посередине
Это https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-291882332 было начало более длинного лога, я его не весь сюда поместил, только то, что вокруг сообщений ==22528== Use of uninitialised value of size 4 ==22528== at 0x40A90B0: _sse_AES_encrypt_compact (in /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0) дальше там ничего особенного
А это https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-291904400 я прервал по ctr+c, он сказал "gracefull shutdown через 600 секунд" и через несколько минут сам завершился. А иначе он бесконечный будет, не правда ли?
А эта https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-291012713 сама упала сразу после старта, что-то там про libboost в начале. Бесконечности из нее не получилось в тот раз. Кстати, не всегда падает, иногда работает, пока не ctrl+c.
@orignal Here you go https://gist.github.com/Barack0bama/ad17c003209148941f770fa20eb96d46 (tested on 32 bits, I'm seeing quiet less memory leaks than the previous time)
2.13, uptime 7 дней 15 часов, ipv6 выкл транзитных туннелей ~1390 ОЗУ 48880 КБ открытых файлов ~2200
По вопросу AVX и AES https://github.com/PurpleI2P/i2pd/issues/835#issuecomment-290101278 https://vscale.io/ в московском ДЦ aes avx avx2 Selectel Но они требуют верификацию по смс, пришлось делать лишние телодвижения
~# cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 79
model name : Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz
stepping : 1
microcode : 0x1
cpu MHz : 2399.996
cache size : 35840 KB
physical id : 0
siblings : 1
core id : 0
cpu cores : 1
apicid : 0
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 13
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl eagerfpu pni pclmulqdq vmx ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch arat xsaveopt tpr_shadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 hle avx2 smep bmi2 erms invpcid rtm rdseed adx smap
bogomips : 4799.99
clflush size : 64
cache_alignment : 64
address sizes : 40 bits physical, 48 bits virtual
power management:
А в Санкт-Петербурге AES отсутствует, только AVX AVX2
~# cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 63
model name : Intel(R) Xeon(R) CPU E5-2670 v3 @ 2.30GHz
stepping : 2
microcode : 0x1
cpu MHz : 2299.998
cache size : 30720 KB
physical id : 0
siblings : 1
core id : 0
cpu cores : 1
apicid : 0
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 13
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl eagerfpu pni pclmulqdq vmx ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer xsave avx f16c rdrand hypervisor lahf_lm abm arat xsaveopt tpr_shadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid
bogomips : 4599.99
clflush size : 64
cache_alignment : 64
address sizes : 40 bits physical, 48 bits virtual
power management:
Оба сервера на минимальном тарифе.
Что то дороговато у них
Не соглашусь. М.б. для традиционного использования типа всяких блогов и инетмагазинов можно найти дешевле и больше, но для i2pd имхо абсолютно достаточно 512 МБ за 200 руб/мес, даже избыточно. Про трафик они мне ответили "мы предоставляем полностью безлимитный трафик, скорость доступа к сети интернет составляет до 1 Гбит/с". Я надеюсь, что сегодняшние 10 Мбит/с в понятие "до" влезают. К объему диска и i/o i2pd вроде не прелъявляет ничего особенного. Про ipv6 пока не ответили, но все равно оно как-то странно работает сейчас.
По ipv6 ответили "запланировано на вторую половину 2017 года". Есть надежда, что https://github.com/PurpleI2P/i2pd/issues/851 к тому времени будет поймано и обезврежено?
https://www.arubacloud.com/ От 1 евро/мес в IT и CZ
IT1 AES и AVX AVX2 пока не увидел
~# cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 45
model name : Intel(R) Xeon(R) CPU E5-2650L v4 @ 1.70GHz
stepping : 2
microcode : 0xb00001e
cpu MHz : 1699.999
cache size : 35840 KB
physical id : 0
siblings : 1
core id : 0
cpu cores : 1
apicid : 0
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 13
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx rdtscp lm constant_tsc arch_perfmon nopl xtopology tsc_reliable nonstop_tsc aperfmperf pni pclmulqdq ssse3 cx16 sse4_1 sse4_2 popcnt aes xsave avx hypervisor lahf_lm ida arat epb pln pts dtherm
bogomips : 3399.99
clflush size : 64
cache_alignment : 64
address sizes : 40 bits physical, 48 bits virtual
power management:
Еще здесь вроде есть, но они всего боятся, серверы в РФ https://galaxydata.ru/vds-kvm/ В чате прислали такое
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 79
model name : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
stepping : 1
microcode : 1
cpu MHz : 2095.320
cache size : 4096 KB
physical id : 0
siblings : 1
core id : 0
cpu cores : 1
apicid : 0
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 13
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good unfair_spinlock pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch arat fsgsbase bmi1 hle avx2 smep bmi2 erms invpcid rtm rdseed adx xsaveopt
bogomips : 4190.64
clflush size : 64
cache_alignment : 64
address sizes : 46 bits physical, 48 bits virtual
power management:
У меня за $10 в год 256 мегов памяти. Пиндостан.
С aes и avx? С безлимитным трафиком или хотя бы 3 ТБ/мес? KVM-XEN-VMWare-HyperV?
Эти итальянцы arubacloud за 12 евро в год дают 1024 метра, но трафика обещают всего 2 ТБ/мес. Украинцы из takewyn за 12 баксов в год дают 256 метров, но работают не слишком стабильно, нет avx, но aes нашелся.
Уже пора заводить отдельную тему "vds для i2pd"? :)
С aes и avx. Терабайт в месяц. Принимают биткойны
Удалил патч debian/patches/01-tune-build-opts.patch, очистил debian/patches/series, собрал пакет, запустил на vscale. Где и как убедиться в использовании aes-avx? В логах и веб-интерфейсе не нашел ничего.
Думаю что никак. В логи не пишется
When i2pd is run, there is a memory leak of 4,027,301 bytes!