20.87% tor [kernel.kallsyms] [k] update_blocked_averages ▒ 8.54% tor tor [.] curve25519_donna ▒ 1.50% tor [kernel.kallsyms] [k] native_queued_spin_lock_slowpath ▒ 1.27% tor libc-2.23.so [.] malloc ▒ 1.21% tor tor [.] connection_bucket_refill ▒ 1.09% tor [kernel.kallsyms] [k] __bpf_prog_run ▒ 0.97% tor libc-2.23.so [.] 0x000000000007fdeb ▒ 0.89% tor libevent-2.0.so.5.1.9 [.] _init ▒ 0.86% tor libcrypto.so.1.0.0 [.] BN_num_bits_word ▒ 0.81% tor tor [.] circuitmux_find_map_entry ▒ 0.68% tor tor [.] curve25519_square_times ▒ 0.66% tor [kernel.kallsyms] [k] try_to_wake_up ▒ 0.65% tor libcrypto.so.1.0.0 [.] BN_num_bits ▒ 0.65% tor tor [.] ewma_cmp_cmux ▒ 0.62% tor libc-2.23.so [.] 0x0000000000081c78 ▒ 0.61% tor [nf_conntrack] [k] __nf_conntrack_find_get ▒ 0.60% tor libcrypto.so.1.0.0 [.] 0x00000000000c7567 ▒ 0.55% tor tor [.] buf_datalen ▒ 0.54% tor libcrypto.so.1.0.0 [.] 0x00000000000c728e ▒ 0.52% tor [kernel.kallsyms] [k] __fget ▒ 0.51% tor tor [.] circuit_get_by_circid_channel ▒ 0.51% tor tor [.] ge25519_nielsadd2
Weird! Was the server seeing much traffic at the time? I'm surprised that none of the compression algorithms, digest algorithms, or AES appeared on profile.
Weird! Was the server seeing much traffic at the time? I'm surprised that none of the compression algorithms, digest algorithms, or AES appeared on profile.
well, consensus updates are uncommon, and AES-NI is very fast. suppose that you get https://calomel.org/aesni_ssl_performance.html performance, then if your relay is 100 megabit/sec and you can do 1700 megabyte/sec AES, then by my calculations, you should spend about 0.7% CPU time in AES. coincidentally, we have symbols in libcrypto.so at 0.60% and 0.54%. https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1598529 is probably relevant, upgrading your kernel will probably help.
as I said on IRC, KIST incidentally moderately improves CPU usage by calling epoll_ctl at a reasonable rate instead of the ridiculousness that was before.
I am running the latest git master 0.3.2.2-alpha-dev (git-51e47481fc6f131d) and I don't see a significant CPU usage increase compared to 0.3.0. It's true this relay's bottleneck is the bandwidth because it's capped, but there is no big difference in terms of CPU % usage per tor user / process as opposite to 0.3.0 - it's still around 9% - 20% with very small period bursts to even 98%.
I am running the latest git master 0.3.2.2-alpha-dev (git-51e47481fc6f131d) and I don't see a significant CPU usage increase compared to 0.3.0. It's true this relay's bottleneck is the bandwidth because it's capped, but there is no big difference in terms of CPU % usage per tor user / process as opposite to 0.3.0 - it's still around 9% - 20% with very small period bursts to even 98%.
You should test with 0.3.1.x, according to Hello71 "KIST incidentally moderately improves CPU"
I am running the latest git master 0.3.2.2-alpha-dev (git-51e47481fc6f131d) and I don't see a significant CPU usage increase compared to 0.3.0. It's true this relay's bottleneck is the bandwidth because it's capped, but there is no big difference in terms of CPU % usage per tor user / process as opposite to 0.3.0 - it's still around 9% - 20% with very small period bursts to even 98%.
You should test with 0.3.1.x, according to Hello71 "KIST incidentally moderately improves CPU"
I also experienced no noticeable increase in CPU usage with 0.3.1.7 compared to 0.3.0.10, although I only ran it for a few hours and didn't precisely measure anything.