silent crashes with ofbs4

Trying to run obfs4 bridge on Debian Trixie on 1GB Raspberry Pi, it regularly seems to crash silently after a few minutes to dozen hours. E.g.

 14:07:09 [NYX_NOTICE] Tor control port closed
 14:07:07 [NOTICE] Removed 528 bytes by killing 45 circuits; 0 circuits remain alive. Also killed 0 non-linked directory connections. Killed 0 edge connections
 14:07:07 [NOTICE] We're low on memory (cell queues total alloc: 528 buffer total alloc: 0, tor compress total alloc: 293257561 (zlib: 395520, zstd: 0, lzma: 292861977), rendezvous cache
   total alloc: 0). Killing circuits withover-long queues. (This behavior is controlled by MaxMemInQueues.)
 14:06:47 [WARN] Possible compression bomb; abandoning stream. [494 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 33341 and output size = 890274 [55 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 28865 and output size = 817344 [38 duplicates hidden]
 14:06:47 [WARN] Detected possible compression bomb with input size = 31845 and output size = 905279 [40 duplicates hidden]
 14:05:47 [WARN] Detected possible compression bomb with input size = 33313 and output size = 890274 [34 duplicates hidden]
 14:04:47 [WARN] Detected possible compression bomb with input size = 31859 and output size = 905279 [48 duplicates hidden]
 14:04:47 [WARN] Detected possible compression bomb with input size = 28885 and output size = 817344 [51 duplicates hidden]
 13:27:47 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 57.128.169.164:443). [178 similar message(s) suppressed in last 3660
   seconds]
 12:34:53 [WARN] Detected possible compression bomb with input size = 29256 and output size = 871523 [30 duplicates hidden]
 12:34:46 [WARN] Detected possible compression bomb with input size = 31480 and output size = 902775 [36 duplicates hidden]
 12:34:46 [WARN] Detected possible compression bomb with input size = 27762 and output size = 827924 [38 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 27526 and output size = 827924 [29 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 22323 and output size = 596032 [37 duplicates hidden]
 12:33:46 [WARN] Detected possible compression bomb with input size = 31518 and output size = 902775 [31 duplicates hidden]
 12:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [179 similar message(s) suppressed in last 3600
   seconds]
 12:26:44 [NOTICE] Heartbeat: Since last heartbeat message, I have seen 5 unique clients.
 12:26:44 [NOTICE] While not bootstrapping, fetched this many bytes: 7581018 (server descriptor fetch); 367 (server descriptor upload); 306322 (consensus network-status fetch); 45770599
   (microdescriptor fetch)
 12:26:44 [NOTICE] While bootstrapping, fetched this many bytes: 23281 (consensus network-status fetch)
 12:26:44 [NOTICE] Heartbeat: Tor's uptime is 6:00 hours, with 2 circuits open. I've sent 10.11 MB and received 57.99 MB. I've received 5 connections on IPv4 and 0 on IPv6. I've made 14
   connections with IPv4 and 0 with IPv6.
 11:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [178 similar message(s) suppressed in last 3600
   seconds]
 11:25:47 [WARN] Detected possible compression bomb with input size = 26425 and output size = 764288
 11:25:47 [WARN] Detected possible compression bomb with input size = 22776 and output size = 617392
 11:24:54 [WARN] Detected possible compression bomb with input size = 28925 and output size = 801152
 11:24:53 [WARN] Detected possible compression bomb with input size = 23684 and output size = 715680 [2 duplicates hidden]
 11:24:46 [WARN] Detected possible compression bomb with input size = 47580 and output size = 1375110 [2 duplicates hidden]
 11:23:46 [WARN] Detected possible compression bomb with input size = 47567 and output size = 1375110 [1 duplicate hidden]
 11:23:46 [WARN] Detected possible compression bomb with input size = 28934 and output size = 799664 [3 duplicates hidden]
 11:21:46 [WARN] Detected possible compression bomb with input size = 23680 and output size = 714240
ii  obfs4proxy                      0.0.14-2+b5                          arm64        pluggable transport proxy for Tor, implementing obfs4
ii  tor                             0.4.8.16-1                           arm64        anonymizing overlay network for TCP

there are no messages in dmesg(8) either (so no kernel OOM).

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information