Your message dated Thu, 24 Dec 2020 19:41:21 +0100 with message-id <109123250.nniJfEyVGO@thyrus> and subject line Re: Bug#895962: kio: http.so resource leak causing background CPU usage has caused the Debian Bug report #895962, regarding kio: http.so resource leak causing background CPU usage to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 895962: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895962 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: kio: http.so resource leak causing background CPU usage
- From: Julien Goodwin <jgoodwin@studio442.com.au>
- Date: Wed, 18 Apr 2018 09:41:49 +1000
- Message-id: <b0116ead-9893-152b-dfda-2dd4aab0b37c@studio442.com.au>
Package: kio Version: 5.44.0-2 Severity: normal http.so seems to have some form of resource leak, leading to constant background CPU use. This occurs for processes launched for both akregator & choqok, stracing affect http.so processes shows constant: ppoll([{fd=4, events=POLLIN}], 1, {tv_sec=0, tv_nsec=1000000}, NULL, 8) = 0 (Timeout) write(3, "\1\0\0\0\0\0\0\0", 8) -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.15.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages kio depends on: ii libacl1 2.2.52-3+b1 ii libc6 2.27-3 ii libgcc1 1:8-20180402-1 ii libgssapi-krb5-2 1.16-2 ii libkf5archive5 5.44.0-1 ii libkf5auth5 5.44.0-1 ii libkf5codecs5 5.44.0-1 ii libkf5completion5 5.44.0-1 ii libkf5configcore5 5.44.0-1 ii libkf5configwidgets5 5.44.0-1 ii libkf5coreaddons5 5.44.0-1 ii libkf5dbusaddons5 5.44.0-1 ii libkf5doctools5 5.44.0-1 ii libkf5i18n5 5.44.0-1 ii libkf5itemviews5 5.44.0-1 ii libkf5kiocore5 5.44.0-2 ii libkf5kiontlm5 5.44.0-2 ii libkf5kiowidgets5 5.44.0-2 ii libkf5notifications5 5.44.0-1 ii libkf5service-bin 5.44.0-1 ii libkf5service5 5.44.0-1 ii libkf5solid5 5.44.0-1 ii libkf5textwidgets5 5.44.0-1 ii libkf5wallet-bin 5.44.0-1 ii libkf5wallet5 5.44.0-1 ii libkf5widgetsaddons5 5.44.0-1 ii libkf5windowsystem5 5.44.0-1 ii libqt5core5a 5.10.1+dfsg-5 ii libqt5dbus5 5.10.1+dfsg-5 ii libqt5gui5 5.10.1+dfsg-5 ii libqt5network5 5.10.1+dfsg-5 ii libqt5script5 5.10.1+dfsg-2 ii libqt5widgets5 5.10.1+dfsg-5 ii libqt5x11extras5 5.10.1-2 ii libqt5xml5 5.10.1+dfsg-5 ii libstdc++6 8-20180402-1 ii libxml2 2.9.4+dfsg1-6.1 ii libxslt1.1 1.1.29-5 kio recommends no packages. kio suggests no packages. -- no debconf information
--- End Message ---
--- Begin Message ---
- To: Julien Goodwin <jgoodwin@studio442.com.au>, 895962-done@bugs.debian.org
- Subject: Re: Bug#895962: kio: http.so resource leak causing background CPU usage
- From: Pino Toscano <pino@debian.org>
- Date: Thu, 24 Dec 2020 19:41:21 +0100
- Message-id: <109123250.nniJfEyVGO@thyrus>
- Reply-to: 895962@bugs.debian.org
- In-reply-to: <b0116ead-9893-152b-dfda-2dd4aab0b37c@studio442.com.au>
- References: <b0116ead-9893-152b-dfda-2dd4aab0b37c@studio442.com.au>
Source: kio Source-Version: 5.69.0-1 Done: Sandro Knauß <hefee@debian.org> In data mercoledì 18 aprile 2018 01:41:49 CET, Julien Goodwin ha scritto: > Package: kio > Version: 5.44.0-2 > Severity: normal > > http.so seems to have some form of resource leak, leading to constant > background CPU use. This occurs for processes launched for both akregator > & choqok, stracing affect http.so processes shows constant: > > ppoll([{fd=4, events=POLLIN}], 1, {tv_sec=0, tv_nsec=1000000}, NULL, 8) = 0 (Timeout) > write(3, "\1\0\0\0\0\0\0\0", 8) According to its upstream bug report https://bugs.kde.org/show_bug.cgi?id=392768 this was fixed in kio 5.67.0. Hence, closing accordingly. Thanks for your report, -- Pino ToscanoAttachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---