-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cron uses 100% CPU with 2022.04 on Raspberry #1042
Comments
Are you able to reproduce this with 2022.04.1? |
I just tried it, too, sadly it's still 100%-ing the CPU. |
I observed the same high CPU usage with 2022.04 on Raspberry Output of
One of the Output of
|
Unable to repro this on a Pi 4 (32 bit Bullseye):
Pi 3b (64 bit Bullseye)
Is there any more detail you can give about your systems? Docker run commands/compose files? |
Mine is a Pi3 B+, running this:
(so 32bit) |
Run the container as privileged. I have 3 pi 3b+ with identical docker+docker-compose version and docker-compose.yml, one of them does this and spams
while running unprivileged. Other 2 don't do this. No idea why. |
Maybe a comparison between them can bring us more information. Which OS are you running on each of your 3 raspberry pi 3B+? |
pi1 is the one that does what's described in this issue OS: all 3 use
docker-compose.yml edit: the env variables are mostly the same like this:
with PIHOLE_PASSWD, SERVER_IP and V_HOST being the only 3 that change between the instances |
I can't understand... I was expecting to see a difference here. |
Indeed. If anything, I'd expect pi3 making problems, as pi2 is a literal clone of pi1 with changed hostname, whereas pi3 is a flightradar24 install with pihole in docker slapped on top. Or maybe the issue relates to something we didn't think to compare. |
I noticed As per debuerreotype/docker-debian-artifacts#106 (comment)
I upgraded libseccomp2 to version 2.5.1 from backports following the approach described here under option 2, and more general here. After restarting the pihole container, CPU utilization was back to known, low values and the not permitted syscalls are gone. Can you check your libseccomp2 versions on your systems?
|
That was it! I followed the Option 2 from the link and all is well after container rebuild without privileged |
Jackpot for me as well, installing the backport fixed the obscene CPU usage, thanks! |
I think we can close the issue then. Or we could make a readme update to tell people about this, and close the issue with the PR. |
This issue has been mentioned on Pi-hole Userspace. There might be relevant details there: |
I ran into this as well, but upgrading libseccomp2 didn't fix anything (I made sure the correct version is installed, and even rebooted the raspberrypi).
However, to solve the cron issue, I decided to follow this and override the seccomp policy for now. I'll upgrade the distribution later. Doing this solved my issue with cron taking 100% of one core and For reference, here is how I launch the container:
|
Updated my pi that runs pihole in docker from buster to bullseye, load is down to normal. |
This is a: Bug
Details
I updated from 2022.02.1 to 2022.04 just now, and noticed 100% CPU usage for the container.
Reverting to 2022.02.1 fixed it.
Related Issues
How to reproduce the issue
Test-running it with
docker run -d --name tmppihole pihole/pihole:2022.04
Output of
docker top
:With the most relevant line being
Output of
docker stats
:I waited for about 10-15 minutes, hoping it's just some long-running startup thing, but no luck, still 100% CPU usage.
Tried it on my main machine, Pop!_OS 21.04, it seems to work there better.
These common fixes didn't work for my issue
docker run
example(s) in the readme (removing any customizations I added)If the above debugging / fixes revealed any new information note it here.
Add any other debugging steps you've taken or theories on root cause that may help.
The text was updated successfully, but these errors were encountered: