Bug 141323
Summary: | service spamassassin restart fails under load | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Doncho Gunchev <dgunchev> |
Component: | spamassassin | Assignee: | Warren Togami <wtogami> |
Status: | CLOSED DUPLICATE | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | medium | ||
Version: | rawhide | CC: | felicity, jm, parkerm, reg+redhat, wtogami |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-08-17 04:19:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Doncho Gunchev
2004-11-30 14:34:18 UTC
Hmm, your suggestion of "sleep 5" between stop and start might be a good idea. But first lets ask upstream if there is any better way of ensuring that spamd is completely killed and released the port, which would avoid the need for this kind of ugly hack. This is the snippet from /etc/init.d/spamassassin showing the part that fails to stop the service before returning. stop) # Stop daemons. echo -n "Shutting down spamd: " killproc spamd RETVAL=$? echo [ $RETVAL = 0 ] && rm -f /var/lock/subsys/spamassassin ;; http://people.redhat.com/wtogami/temp/functions killproc is located in this script located at /etc/init.d/functions. killproc is returning before spamd is fully dead. spamd children are respawning after they are killed before the parent process is dead - although this may not be related to the "fails under load" problem. There are signal handling problems here that need to be investigated upstream in spamd. I'm adding the sleep 5 here as a workaround, as it should avoid trouble in 99% cases. I am willing to guess that "killall -9 spamd" might corrupt databases and is not a solution. Keeping bug open to keep the spamd issues on the radar. interesting problem. could someone open this upstream? everyone can, I'll try when I have a bit more free time and add references here and there, but feel free to do so before me :) I belive it has something to do with http://bugzilla.spamassassin.org/show_bug.cgi?id=2186 ... I opened http://bugzilla.spamassassin.org/show_bug.cgi?id=4432 with link to this one. Bug #161785 seems to have a better explanation of the cause of this bug. This is not the fault of spamd itself, but rather the init.d script's codepath to kill spamd. It would be helpful if upstream could look at the excellent explanation in Bug #161785. I am hoping there is a better solution to this problem than the suggested shell script .pid solution suggested in that bug. Wouldn't it be preferable to have a solution where spamd itself returns when it is finished stopping? *** This bug has been marked as a duplicate of 161785 *** |