Activity log for bug #1973084

Date Who What changed Old value New value Message
2022-05-11 21:18:44 aramaicus bug added bug
2022-05-11 21:18:44 aramaicus attachment added Crash reports from ubuntu server 22.04 running on Raspberry Pi 4 https://bugs.launchpad.net/bugs/1973084/+attachment/5588753/+files/ubuntu%20server%20crash%2001-may-2022.7z
2022-05-11 21:24:08 aramaicus attachment removed Crash reports from ubuntu server 22.04 running on Raspberry Pi 4 https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1973084/+attachment/5588753/+files/ubuntu%20server%20crash%2001-may-2022.7z
2022-05-11 21:25:05 aramaicus attachment added /var/log files after a crash https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1973084/+attachment/5588754/+files/ubuntu%20server%20crash%2024-apr-2022.7z
2022-05-12 08:01:47 Sebastien Bacher transmission (Ubuntu): status New Incomplete
2022-05-12 09:22:40 s2472349 bug added subscriber s2472349
2022-05-14 21:08:28 aramaicus attachment added journalctl_-b_0.txt https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1973084/+attachment/5589766/+files/journalctl_-b_0.txt
2022-05-16 09:09:24 Sebastien Bacher transmission (Ubuntu): status Incomplete New
2022-07-17 17:01:02 Launchpad Janitor transmission (Ubuntu): status New Confirmed
2022-08-16 11:34:38 Sandor Fodor bug watch added https://github.com/transmission/transmission/issues/3536
2022-08-16 11:34:38 Sandor Fodor bug watch added https://github.com/transmission/transmission/issues/3494
2022-11-20 12:33:23 Andrew bug added subscriber Andrew
2022-11-27 14:03:46 micsu bug watch added https://github.com/transmission/transmission/issues/3055
2023-01-06 18:27:22 Simon Wydooghe bug added subscriber Simon Wydooghe
2023-04-11 01:23:02 Lem bug added subscriber Lem
2023-10-25 09:39:46 Marius Gedminas attachment added debdiff that replaces mem-leaky ubuntu openssl3 patch with the gentoo openssl3 patch https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1973084/+attachment/5713173/+files/fix-mem-leak.debdiff
2023-10-25 12:23:31 Ubuntu Foundations Team Bug Bot tags patch
2023-10-25 12:23:36 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Sponsors
2023-10-27 20:18:43 Andreas Hasenack bug watch added https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051056
2023-10-27 20:18:43 Andreas Hasenack bug task added transmission (Debian)
2023-10-27 20:29:10 Andreas Hasenack nominated for series Ubuntu Lunar
2023-10-27 20:29:10 Andreas Hasenack bug task added transmission (Ubuntu Lunar)
2023-10-27 20:29:10 Andreas Hasenack nominated for series Ubuntu Jammy
2023-10-27 20:29:10 Andreas Hasenack bug task added transmission (Ubuntu Jammy)
2023-10-27 20:38:43 Bug Watch Updater transmission (Debian): status Unknown New
2023-10-27 20:58:13 Andreas Hasenack bug added subscriber Andreas Hasenack
2023-11-17 18:13:05 Andreas Hasenack description Transmission uses a lot of RAM in ubuntu 22.04 server (arm64) runnign on a Raspberry Pi 4. It "eats" RAM and the RAM usage grows each hour until it crashes the system. I sideloaded transmission-daemon and its dependancies from debian 11 (arm64) locked the packages so apt won't update them and, ever since, this issue hasn't happened. Description: Ubuntu 22.04 LTS Release: 22.04 [ Impact ] There is a memory leak in transmission-daemon that was introduced by a faulty openssl3 patch. It has been reported that it's noticeable after a few hours of seeding/downloading torrent files, less than a day. [ Test Plan ] Being a memory leak, there is no immediate/quick test that can be performed, other than letting it run for a few hours and measure memory consumption "before" and "after". comment #5 mentions about 1Gb of RAM after 18h of runtime. #comment 14 mentions 12Gb of RAM, but not for how long it was running. I'd suggest a 24h test and that it should stay under 1Gb of RAM. [ Where problems could occur ] The patch loads the default and legacy openssl3 providers. This will potentially change the set of algorithms available to the application, compared to what was there before. That being said, the legacy provider is a conservative approach, and the likely result is that *more* algorithms will become available, and not less. This is also the approach I have seen in other applications that were rebuilt using openssl3 instead of openssl1.1. It does seem safer than the original patch, which was manually handling ciphers, in particular RC4, and, well, introduced the memory leak. [ Other Info ] Patch came from gentoo. [ Original Description ] Transmission uses a lot of RAM in ubuntu 22.04 server (arm64) runnign on a Raspberry Pi 4. It "eats" RAM and the RAM usage grows each hour until it crashes the system. I sideloaded transmission-daemon and its dependancies from debian 11 (arm64) locked the packages so apt won't update them and, ever since, this issue hasn't happened. Description: Ubuntu 22.04 LTS Release: 22.04
2023-11-17 18:16:04 Andreas Hasenack description [ Impact ] There is a memory leak in transmission-daemon that was introduced by a faulty openssl3 patch. It has been reported that it's noticeable after a few hours of seeding/downloading torrent files, less than a day. [ Test Plan ] Being a memory leak, there is no immediate/quick test that can be performed, other than letting it run for a few hours and measure memory consumption "before" and "after". comment #5 mentions about 1Gb of RAM after 18h of runtime. #comment 14 mentions 12Gb of RAM, but not for how long it was running. I'd suggest a 24h test and that it should stay under 1Gb of RAM. [ Where problems could occur ] The patch loads the default and legacy openssl3 providers. This will potentially change the set of algorithms available to the application, compared to what was there before. That being said, the legacy provider is a conservative approach, and the likely result is that *more* algorithms will become available, and not less. This is also the approach I have seen in other applications that were rebuilt using openssl3 instead of openssl1.1. It does seem safer than the original patch, which was manually handling ciphers, in particular RC4, and, well, introduced the memory leak. [ Other Info ] Patch came from gentoo. [ Original Description ] Transmission uses a lot of RAM in ubuntu 22.04 server (arm64) runnign on a Raspberry Pi 4. It "eats" RAM and the RAM usage grows each hour until it crashes the system. I sideloaded transmission-daemon and its dependancies from debian 11 (arm64) locked the packages so apt won't update them and, ever since, this issue hasn't happened. Description: Ubuntu 22.04 LTS Release: 22.04 [ Impact ] There is a memory leak in transmission-daemon that was introduced by a faulty openssl3 patch. It has been reported that it's noticeable after a few hours of seeding/downloading torrent files, less than a day. [ Test Plan ] Being a memory leak, there is no immediate/quick test that can be performed, other than letting it run for a few hours and measure memory consumption "before" and "after". comment #5 mentions about 1Gb of RAM after 18h of runtime. #comment 14 mentions 12Gb of RAM, but not for how long it was running. comment #20 says that after 24h using the patched version from a PPA build, the memory consumption was steady at 300Mb. I'd suggest a 24h test and that it should stay under 1Gb of RAM. [ Where problems could occur ] The patch loads the default and legacy openssl3 providers. This will potentially change the set of algorithms available to the application, compared to what was there before. That being said, the legacy provider is a conservative approach, and the likely result is that *more* algorithms will become available, and not less. This is also the approach I have seen in other applications that were rebuilt using openssl3 instead of openssl1.1. It does seem safer than the original patch, which was manually handling ciphers, in particular RC4, and, well, introduced the memory leak. [ Other Info ] Patch came from gentoo. [ Original Description ] Transmission uses a lot of RAM in ubuntu 22.04 server (arm64) runnign on a Raspberry Pi 4. It "eats" RAM and the RAM usage grows each hour until it crashes the system. I sideloaded transmission-daemon and its dependancies from debian 11 (arm64) locked the packages so apt won't update them and, ever since, this issue hasn't happened. Description: Ubuntu 22.04 LTS Release: 22.04
2023-11-17 18:26:05 Andreas Hasenack transmission (Ubuntu): status Confirmed Fix Released
2023-11-17 18:27:01 Andreas Hasenack removed subscriber Ubuntu Sponsors
2023-11-20 17:31:35 Timo Aaltonen transmission (Ubuntu Lunar): status New Fix Committed
2023-11-20 17:31:36 Timo Aaltonen bug added subscriber Ubuntu Stable Release Updates Team
2023-11-20 17:31:38 Timo Aaltonen bug added subscriber SRU Verification
2023-11-20 17:31:42 Timo Aaltonen tags patch patch verification-needed verification-needed-lunar
2023-11-20 17:36:34 Timo Aaltonen transmission (Ubuntu Jammy): status New Fix Committed
2023-11-20 17:36:38 Timo Aaltonen tags patch verification-needed verification-needed-lunar patch verification-needed verification-needed-jammy verification-needed-lunar
2023-12-09 20:23:02 Jeremy BĂ­cha tags patch verification-needed verification-needed-jammy verification-needed-lunar patch verification-done-jammy verification-needed verification-needed-lunar
2024-01-10 15:43:24 Robie Basak tags patch verification-done-jammy verification-needed verification-needed-lunar patch verification-done verification-done-jammy verification-done-lunar
2024-01-11 13:17:06 Launchpad Janitor transmission (Ubuntu Lunar): status Fix Committed Fix Released
2024-01-11 13:17:11 Andreas Hasenack removed subscriber Ubuntu Stable Release Updates Team
2024-01-11 13:17:50 Launchpad Janitor transmission (Ubuntu Jammy): status Fix Committed Fix Released
2024-04-10 02:32:54 Bug Watch Updater transmission (Debian): status New Confirmed
2024-05-06 12:17:09 Bug Watch Updater transmission (Debian): status Confirmed Fix Released
2024-05-06 13:50:39 Andrew removed subscriber Andrew