Bug 1370381
Summary: | dbus-daemon keeps locking and using all CPU | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Rupesh Patel <rupatel> | ||||
Component: | dbus | Assignee: | David King <dking> | ||||
Status: | CLOSED ERRATA | QA Contact: | Desktop QE <desktop-qa-list> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | high | ||||||
Version: | 7.3 | CC: | cww, dking, jkoten, mcepl, mclasen, rupatel, tpelka | ||||
Target Milestone: | rc | Keywords: | OtherQA | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | dbus-1.10.24-1.el7 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2018-04-10 12:52:20 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1298243, 1393395, 1420851, 1477211, 1479818 | ||||||
Attachments: |
|
Description
Rupesh Patel
2016-08-26 05:51:14 UTC
Created attachment 1194212 [details]
strace file
I have finally been able to get access to the Customer Portal to examine the case, and it seems there is already a patch in upstream dbus git that should fix the problem. https://cgit.freedesktop.org/dbus/dbus/commit/?id=a548141b172a078dd0073d718da3fb655821860a This also turns out to have already been fixed in RHEL 6.7 in bug 1118456 (ignore the later status changes in that bug, and only pay attention to the changes from 2015). Customer mentioned he still facing an issue with test rpm too. I collected strace output and could see still those messages. 18676 21:37:40.778455 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000007> 18676 21:37:40.778474 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778505 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000006> 18676 21:37:40.778536 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000006> 18676 21:37:40.778556 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778575 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000006> 18676 21:37:40.778594 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000006> 18676 21:37:40.778614 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778633 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000007> 18676 21:37:40.778652 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000007> 18676 21:37:40.778672 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778691 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000007> 18676 21:37:40.778710 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000007> 18676 21:37:40.778732 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778751 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000006> 18676 21:37:40.778771 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000007> 18676 21:37:40.778801 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778819 epoll_wait(4, {{EPOLLIN, {u32=3, u64=1262679204877565955}}}, 64, -1) = 1 <0.000006> 18676 21:37:40.778838 accept4(3, 0x7ffccec79290, [16], SOCK_CLOEXEC) = -1 EMFILE (Too many open files) <0.000006> 18676 21:37:40.778858 fcntl(-1, F_GETFD) = -1 EBADF (Bad file descriptor) <0.000006> 18676 21:37:40.778876 epoll_wait(4, <detached ...> Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0765 |