Hello aramaicus, or anyone else affected,

Accepted transmission into jammy-proposed. The package will build now
and be available at
https://launchpad.net/ubuntu/+source/transmission/3.00-2ubuntu2.1 in a
few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
jammy to verification-done-jammy. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-jammy. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to transmission in Ubuntu.
https://bugs.launchpad.net/bugs/1973084

Title:
  transmission-daemon high RAM usage

Status in transmission package in Ubuntu:
  Fix Released
Status in transmission source package in Jammy:
  Fix Committed
Status in transmission source package in Lunar:
  Fix Committed
Status in transmission package in Debian:
  New

Bug description:
  [ Impact ]

  There is a memory leak in transmission-daemon that was introduced by a
  faulty openssl3 patch. It has been reported that it's noticeable after
  a few hours of seeding/downloading torrent files, less than a day.

  [ Test Plan ]

  Being a memory leak, there is no immediate/quick test that can be
  performed, other than letting it run for a few hours and measure
  memory consumption "before" and "after". comment #5 mentions about 1Gb
  of RAM after 18h of runtime. #comment 14 mentions 12Gb of RAM, but not
  for how long it was running.

  comment #20 says that after 24h using the patched version from a PPA
  build, the memory consumption was steady at 300Mb.

  I'd suggest a 24h test and that it should stay under 1Gb of RAM.

  [ Where problems could occur ]

  The patch loads the default and legacy openssl3 providers. This will
  potentially change the set of algorithms available to the application,
  compared to what was there before. That being said, the legacy
  provider is a conservative approach, and the likely result is that
  *more* algorithms will become available, and not less. This is also
  the approach I have seen in other applications that were rebuilt using
  openssl3 instead of openssl1.1.

  It does seem safer than the original patch, which was manually
  handling ciphers, in particular RC4, and, well, introduced the memory
  leak.

  [ Other Info ]

  Patch came from gentoo.

  [ Original Description ]
  Transmission uses a lot of RAM in ubuntu 22.04 server (arm64) runnign on a 
Raspberry Pi 4.

  It "eats" RAM and the RAM usage grows each hour until it crashes the
  system.

  I sideloaded transmission-daemon and its dependancies from debian 11
  (arm64) locked the packages so apt won't update them and, ever since,
  this issue hasn't happened.

  Description:    Ubuntu 22.04 LTS
  Release:        22.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1973084/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to