Bug 432706
Summary: | [RHEL4] nscd leaks unix sockets to /var/run/nscd/socket | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Rafael Ferreira <rafael.ferreira> |
Component: | glibc | Assignee: | Andreas Schwab <schwab> |
Status: | CLOSED NOTABUG | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 4.5 | CC: | cward, drepper, fweimer, jakub, jbastian, jwest, linux_support, redhat-bugzilla, tao |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-06-07 05:45:53 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Rafael Ferreira
2008-02-13 22:22:17 UTC
similar problem observed in Red Hat Enterprise Linux 5, using ldap to an openldap server. with the caveat that in this case, nscd was eating 100 of 1 CPUs running in a busy loop trying to bind to the UNIX socket for /var/run/nscd/socket as shown by : time(NULL) = 1205259067 accept(10, 0, NULL) = -1 EMFILE (Too many open files) epoll_wait(11, {{EPOLLRDNORM, {u32=10, u64=10}}}, 100, 29988) = 1 time(NULL) = 1205259067 accept(10, 0, NULL) = -1 EMFILE (Too many open files) epoll_wait(11, {{EPOLLRDNORM, {u32=10, u64=10}}}, 100, 29988) = 1 time(NULL) = 1205259067 accept(10, 0, NULL) = -1 EMFILE (Too many open files) epoll_wait(11, {{EPOLLRDNORM, {u32=10, u64=10}}}, 100, 29988) = 1 time(NULL) = 1205259067 accept(10, 0, NULL) = -1 EMFILE (Too many open files) after it leaked all its 1024 file handles with socket connections as shown by : nscd 10501 nscd 5r REG 3,2 217016 1038341 /var/db/nscd/passwd nscd 10501 nscd 6u REG 3,2 217016 1038342 /var/db/nscd/group nscd 10501 nscd 7r REG 3,2 217016 1038342 /var/db/nscd/group nscd 10501 nscd 8u REG 3,2 217016 1038340 /var/db/nscd/hosts nscd 10501 nscd 9r REG 3,2 217016 1038340 /var/db/nscd/hosts nscd 10501 nscd 10u unix 0xe7921280 12076246 /var/run/nscd/socket nscd 10501 nscd 11r 0000 0,10 0 12076248 eventpoll nscd 10501 nscd 12u sock 0,5 12089279 can't identify protocol nscd 10501 nscd 13u unix 0xebade480 12077692 socket nscd 10501 nscd 14u sock 0,5 12098818 can't identify protocol nscd 10501 nscd 15u sock 0,5 12108033 can't identify protocol nscd 10501 nscd 16u sock 0,5 12136264 can't identify protocol nscd 10501 nscd 17u sock 0,5 12156091 can't identify protocol nscd 10501 nscd 18u sock 0,5 12189201 can't identify protocol .. nscd 10501 nscd 1022u sock 0,5 35734554 can't identify protocol nscd 10501 nscd 1023u unix 0xd6582300 118834655 /var/run/nscd/socket This doesn't look like a libc problem. In the original report it seems like nscd is in trouble. Programs don't get a response. Comment #1 shows one possible way this can happen. There are no known reports of nscd not closing descriptors. And the fact that LDAP is mentioned makes this all the less likely. We have no other report like this and would need more information. And this time preferably without the nss_ldap module. The next RHEL5 update will likely contain some nscd updates based on the current upstream code. This code has no know issues. I can confirm this problem. When the problem situation is present, killing nscd makes it go away. Symptoms include not being able to start any new programs because they are SIGPIPE'd and not even being able to log in on the console. There is nothing in the syslog and nothing in dmesg either. I am using nss_ldap, of course - it's rather hard to get user authorization information from LDAP without doing so. I should also say that I've had this occur on both x86 and x86_64. Support, Customers, I have uploaded test packages that should fix this issue below. These packages - if the issue reported can be confirmed as resolved - will be included in the upcoming 4.8 release. http://people.redhat.com/cward/4.8/nss_ldap/ The latest 4.8 Beta can be downloaded from RHN @ https://rhn.redhat.com/network/software/download_isos_full.pxt Please test and provide us with feedback ASAP. |