C.Y.M.
2004-Jun-07 03:04 UTC
[Logcheck-devel] Bug#253075: logcheck: line 84: kill: (771) - No such process
Package: logcheck Version: 1.2.22_all When logcheck attempts to startup, I get the following error message and logcheck dies: "/usr/sbin/logcheck: line 84: kill: (771) - No such process" I have gone back to version 1.2.21 and the problem goes away.
maks attems
2004-Jun-07 15:54 UTC
Bug#253075: [Logcheck-devel] Bug#253075: logcheck: line 84: kill: (771) - No such process
On Sun, 06 Jun 2004, C.Y.M. wrote:> "/usr/sbin/logcheck: line 84: kill: (771) - No such process" >thanks for your bugreport, please take a look at #252966 it the proposed solution cures named bug. a++ maks -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.alioth.debian.org/pipermail/logcheck-devel/attachments/20040607/fc073ab6/attachment.pgp
C.Y.M.
2004-Jun-08 07:48 UTC
Bug#253075: [Logcheck-devel] Bug#253075: logcheck: line 84: kill: (771) - No such process
Thank you for the quick solution. I have applied the following patch and logcheck appears to be running now. Although, after about 6 hours, I have this new message (which I am unsure is related, but thought I would mention): /usr/sbin/logcheck: line 1: 2766 Segmentation fault rm -r $TMPDIR Thank you.> -----Original Message----- > From: maximilian attems [mailto:max at stro.at] On Behalf Of maks attems > Sent: Monday, June 07, 2004 8:55 AM > To: syphir at syphir.sytes.net; 253075 at bugs.debian.org > Subject: Re: [Logcheck-devel] Bug#253075: logcheck: line 84: > kill: (771) - No such process > > On Sun, 06 Jun 2004, C.Y.M. wrote: > > "/usr/sbin/logcheck: line 84: kill: (771) - No such process" > > > > thanks for your bugreport, please take a look at #252966 > it the proposed solution cures named bug. > > a++ maks > >
C.Y.M.
2004-Jun-08 08:27 UTC
Bug#253075: [Logcheck-devel] Bug#253075: logcheck: line 84: kill: (771) - No such process
I have also attached the log of the segfault just incase it would help debug the problem: Jun 8 00:02:03 nofear kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000044 Jun 8 00:02:03 nofear kernel: printing eip: Jun 8 00:02:03 nofear kernel: c012e633 Jun 8 00:02:03 nofear kernel: *pde = 00000000 Jun 8 00:02:03 nofear kernel: Oops: 0002 [#1] Jun 8 00:02:03 nofear kernel: PREEMPT Jun 8 00:02:03 nofear kernel: Modules linked in: parport_pc lp parport snd_mpu401 snd_via82xx snd_ac97_codec snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc snd_mpu401_uart snd_rawmidi snd_seq_device snd soundcore af_packet Jun 8 00:02:03 nofear kernel: CPU: 0 Jun 8 00:02:03 nofear kernel: EIP: 0060:[find_get_pages+67/112] Not tainted Jun 8 00:02:03 nofear kernel: EFLAGS: 00010097 (2.6.7-rc3.060704.1) Jun 8 00:02:03 nofear kernel: EIP is at find_get_pages+0x43/0x70 Jun 8 00:02:03 nofear kernel: eax: 00000040 ebx: 00000002 ecx: 00000040 edx: 00000001 Jun 8 00:02:03 nofear kernel: esi: c6e21ef0 edi: e639c454 ebp: e639c4ec esp: c6e21e98 Jun 8 00:02:03 nofear kernel: ds: 007b es: 007b ss: 0068 Jun 8 00:02:03 nofear kernel: Process rm (pid: 2766, threadinfo=c6e20000 task=dbac5910) Jun 8 00:02:03 nofear kernel: Stack: e639c4f0 c6e21ef0 00000000 00000010 c6e21ee8 c0375540 c013866e e639c4ec Jun 8 00:02:03 nofear kernel: 00000000 00000010 c6e21ef0 00000000 c01388be c6e21ee8 e639c4ec 00000000 Jun 8 00:02:03 nofear kernel: 00000010 c6e20000 00000000 00000000 00000000 00000000 c14993c0 00000040 Jun 8 00:02:03 nofear kernel: Call Trace: Jun 8 00:02:03 nofear kernel: [pagevec_lookup+46/64] pagevec_lookup+0x2e/0x40 Jun 8 00:02:03 nofear kernel: [truncate_inode_pages+126/656] truncate_inode_pages+0x7e/0x290 Jun 8 00:02:03 nofear kernel: [__ext3_journal_stop+36/80] __ext3_journal_stop+0x24/0x50 Jun 8 00:02:03 nofear kernel: [ext3_unlink+157/400] ext3_unlink+0x9d/0x190 Jun 8 00:02:03 nofear kernel: [generic_delete_inode+250/272] generic_delete_inode+0xfa/0x110 Jun 8 00:02:03 nofear kernel: [iput+98/128] iput+0x62/0x80 Jun 8 00:02:03 nofear kernel: [sys_unlink+270/320] sys_unlink+0x10e/0x140 Jun 8 00:02:03 nofear kernel: [syscall_call+7/11] syscall_call+0x7/0xb Jun 8 00:02:03 nofear kernel: Jun 8 00:02:03 nofear kernel: Code: ff 40 04 42 39 da 72 f5 fb b8 00 e0 ff ff 21 e0 ff 48 14 8b Jun 8 00:02:03 nofear kernel: <6>note: rm[2766] exited with preempt_count 1 Jun 8 00:02:03 nofear kernel: bad: scheduling while atomic! Jun 8 00:02:03 nofear kernel: [schedule+1148/1168] schedule+0x47c/0x490 Jun 8 00:02:03 nofear kernel: [unmap_page_range+75/128] unmap_page_range+0x4b/0x80 Jun 8 00:02:03 nofear kernel: [unmap_vmas+428/448] unmap_vmas+0x1ac/0x1c0 Jun 8 00:02:03 nofear kernel: [exit_mmap+131/352] exit_mmap+0x83/0x160 Jun 8 00:02:03 nofear kernel: [mmput+100/144] mmput+0x64/0x90 Jun 8 00:02:03 nofear kernel: [do_exit+338/1024] do_exit+0x152/0x400 Jun 8 00:02:03 nofear kernel: [do_page_fault+0/1292] do_page_fault+0x0/0x50c Jun 8 00:02:03 nofear kernel: [die+248/256] die+0xf8/0x100 Jun 8 00:02:03 nofear kernel: [do_page_fault+478/1292] do_page_fault+0x1de/0x50c Jun 8 00:02:03 nofear kernel: [ext3_dirty_inode+105/144] ext3_dirty_inode+0x69/0x90 Jun 8 00:02:03 nofear kernel: [__find_get_block+101/224] __find_get_block+0x65/0xe0 Jun 8 00:02:03 nofear kernel: [__getblk+43/96] __getblk+0x2b/0x60 Jun 8 00:02:03 nofear kernel: [wake_up_buffer+19/64] wake_up_buffer+0x13/0x40 Jun 8 00:02:03 nofear kernel: [do_get_write_access+598/1536] do_get_write_access+0x256/0x600 Jun 8 00:02:03 nofear kernel: [do_page_fault+0/1292] do_page_fault+0x0/0x50c Jun 8 00:02:03 nofear kernel: [error_code+45/56] error_code+0x2d/0x38 Jun 8 00:02:03 nofear kernel: [find_get_pages+67/112] find_get_pages+0x43/0x70 Jun 8 00:02:03 nofear kernel: [pagevec_lookup+46/64] pagevec_lookup+0x2e/0x40 Jun 8 00:02:03 nofear kernel: [truncate_inode_pages+126/656] truncate_inode_pages+0x7e/0x290 Jun 8 00:02:03 nofear kernel: [__ext3_journal_stop+36/80] __ext3_journal_stop+0x24/0x50 Jun 8 00:02:03 nofear kernel: [ext3_unlink+157/400] ext3_unlink+0x9d/0x190 Jun 8 00:02:03 nofear kernel: [generic_delete_inode+250/272] generic_delete_inode+0xfa/0x110 Jun 8 00:02:03 nofear kernel: [iput+98/128] iput+0x62/0x80 Jun 8 00:02:03 nofear kernel: [sys_unlink+270/320] sys_unlink+0x10e/0x140 Jun 8 00:02:03 nofear kernel: [syscall_call+7/11] syscall_call+0x7/0xb> -----Original Message----- > From: maximilian attems [mailto:max at stro.at] On Behalf Of maks attems > Sent: Monday, June 07, 2004 8:55 AM > To: syphir at syphir.sytes.net; 253075 at bugs.debian.org > Subject: Re: [Logcheck-devel] Bug#253075: logcheck: line 84: > kill: (771) - No such process > > On Sun, 06 Jun 2004, C.Y.M. wrote: > > "/usr/sbin/logcheck: line 84: kill: (771) - No such process" > > > > thanks for your bugreport, please take a look at #252966 > it the proposed solution cures named bug. > > a++ maks > >
Debian Bug Tracking System
2004-Jun-10 09:03 UTC
[Logcheck-devel] Bug#253075: marked as done (logcheck: line 84: kill: (771) - No such process)
Your message dated Thu, 10 Jun 2004 04:47:03 -0400 with message-id <E1BYLDD-0006TD-00 at newraff.debian.org> and subject line Bug#253075: fixed in logcheck 1.2.22a has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 7 Jun 2004 03:04:16 +0000>From syphir at syphir.sytes.net Sun Jun 06 20:04:16 2004Return-path: <syphir at syphir.sytes.net> Received: from dialup-4.246.27.7.dial1.sanjose1.level3.net (nofear) [4.246.27.7] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BXAQp-0007f4-00; Sun, 06 Jun 2004 20:04:16 -0700 Received: from hades (hades [10.1.1.66]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by nofear (Postfix) with ESMTP id EE6BE7352F for <submit at bugs.debian.org>; Sun, 6 Jun 2004 20:02:41 -0700 (PDT) Reply-To: <syphir at syphir.sytes.net> From: "C.Y.M." <syphir at syphir.sytes.net> To: <submit at bugs.debian.org> Subject: logcheck: line 84: kill: (771) - No such process Date: Sun, 6 Jun 2004 20:04:48 -0700 Organization: CooLNeT Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAA9mKu6AlYok2efOpJ3sb3O+KAAAAQAAAAzFCi91Qw/k2qSAsX1nbqxwEAAAAA at syphir.sytes.net> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Office Outlook, Build 11.0.5510 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1409 Thread-Index: AcRMPDFt3mDaC4PBR3mBcaYeaDlzow=Disposition-Notification-To: "C.Y.M." <syphir at syphir.sytes.net> Delivered-To: submit at bugs.debian.org X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_44,HAS_PACKAGE, MISSING_OUTLOOK_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: logcheck Version: 1.2.22_all When logcheck attempts to startup, I get the following error message and logcheck dies: "/usr/sbin/logcheck: line 84: kill: (771) - No such process" I have gone back to version 1.2.21 and the problem goes away. --------------------------------------- Received: (at 253075-close) by bugs.debian.org; 10 Jun 2004 08:53:10 +0000>From katie at ftp-master.debian.org Thu Jun 10 01:53:10 2004Return-path: <katie at ftp-master.debian.org> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BYLJ8-0002jB-00; Thu, 10 Jun 2004 01:53:10 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1BYLDD-0006TD-00; Thu, 10 Jun 2004 04:47:03 -0400 From: Todd Troxell <ttroxell at debian.org> To: 253075-close at bugs.debian.org X-Katie: $Revision: 1.49 $ Subject: Bug#253075: fixed in logcheck 1.2.22a Message-Id: <E1BYLDD-0006TD-00 at newraff.debian.org> Sender: Archive Administrator <katie at ftp-master.debian.org> Date: Thu, 10 Jun 2004 04:47:03 -0400 Delivered-To: 253075-close at bugs.debian.org X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 2 Source: logcheck Source-Version: 1.2.22a We believe that the bug you reported is fixed in the latest version of logcheck, which is due to be installed in the Debian FTP archive: logcheck-database_1.2.22a_all.deb to pool/main/l/logcheck/logcheck-database_1.2.22a_all.deb logcheck_1.2.22a.dsc to pool/main/l/logcheck/logcheck_1.2.22a.dsc logcheck_1.2.22a.tar.gz to pool/main/l/logcheck/logcheck_1.2.22a.tar.gz logcheck_1.2.22a_all.deb to pool/main/l/logcheck/logcheck_1.2.22a_all.deb logtail_1.2.22a_all.deb to pool/main/l/logcheck/logtail_1.2.22a_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 253075 at bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Todd Troxell <ttroxell at debian.org> (supplier of updated logcheck package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster at debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thursday, 10 Jun 2004 04:18:23 -0500 Source: logcheck Binary: logcheck logtail logcheck-database Architecture: source all Version: 1.2.22a Distribution: unstable Urgency: low Maintainer: Debian logcheck Team <logcheck-devel at lists.alioth.debian.org> Changed-By: Todd Troxell <ttroxell at debian.org> Description: logcheck - Mails anomalies in the system logfiles to the administrator logcheck-database - A database of system log rules for the use of log checkers logtail - Print log file lines that have not been read Closes: 252966 253075 253260 253486 Changes: logcheck (1.2.22a) unstable; urgency=low . maks: * Fix broken cleancheck call. (Closes: #252966, #253075, #253260, #253486) Files: 5688800d3e88941748cf56494818fbda 672 admin optional logcheck_1.2.22a.dsc 4d17d00ad7a5dba23f08e26e7a7d607c 72795 admin optional logcheck_1.2.22a.tar.gz e2412a6aa1d454f22eda60015b3a57c8 36684 admin optional logcheck_1.2.22a_all.deb 46a5dcc253c7e3f4db39cde92477d8f1 40592 admin optional logcheck-database_1.2.22a_all.deb 20fa7dac8970c7f9cee75a4cbfec9423 21414 admin optional logtail_1.2.22a_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAyBng4u3oQ3FHP2YRAuxcAJ9HdRMk+VTMA5ErhmR7KzeUzRxTaQCfduMl v+woQwv5m2JW60+6jZyg828=PSxP -----END PGP SIGNATURE-----