You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2004/08/04 23:07:15 UTC
[Bug 3667] New: spamd dies (prerelease version - 3.0.0-pre3), Debian stable
http://bugzilla.spamassassin.org/show_bug.cgi?id=3667
Summary: spamd dies (prerelease version - 3.0.0-pre3), Debian
stable
Product: Spamassassin
Version: unspecified
Platform: PC
OS/Version: Linux
Status: NEW
Severity: major
Priority: P4
Component: spamc/spamd
AssignedTo: spamassassin-dev@incubator.apache.org
ReportedBy: will@code404.com
Spamd, running on a Debian (woody/stable) machine; SA version is 3.0.0-pre3.
Perl is v5.6.1, which should be supported with this SA release. Spamassassin
built (cleanly) from source.
Normally, when spamd is running, there is a master process with several child
processes:
root 2041 1 15 13:53 ? 00:00:00 /usr/local/bin/spamd -d
jason 2048 2041 4 13:53 ? 00:00:00 spamd child
root 2049 2041 0 13:53 ? 00:00:00 spamd child
root 2050 2041 0 13:53 ? 00:00:00 spamd child
root 2051 2041 0 13:53 ? 00:00:00 spamd child
root 2052 2041 0 13:53 ? 00:00:00 spamd child
We have seen several instances of spamd dying at (seemingly) random intervals.
When this happens, there is a master process, and then one child process which
keeps dying.
root 30172 1 0 Aug01 ? 00:03:46 /usr/local/bin/spamd -d
root 32122 30172 0 13:51 ? 00:00:00 /usr/local/bin/spamd -d
root 30172 1 0 Aug01 ? 00:03:47 /usr/local/bin/spamd -d
root 1140 30172 0 13:52 ? 00:00:00 /usr/local/bin/spamd -d
root 30172 1 0 Aug01 ? 00:03:47 /usr/local/bin/spamd -d
root 1275 30172 0 13:52 ? 00:00:00 /usr/local/bin/spamd -d
Running strace on the parent process shows this... I'll try to attach a longer
file of this to the bug report later.
rt_sigaction(SIGCHLD, {0x80933f0, [], SA_RESTART|0x4000000}, {0x80933f0, [],
SA_RESTART|0x4000000}, 8) = 0
wait4(-1, 0xbfffe818, 0, NULL) = -1 ECHILD (No child processes)
rt_sigaction(SIGPIPE, {SIG_DFL}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGPIPE, {0x80933f0, [], SA_RESTART|0x4000000}, {SIG_DFL}, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [CHLD], 8) = 0
send(4, "<22>spamd[30172]: server hit by "..., 49, 0) = -1 ENOTCONN (Transport
endpoint is not connected)
fork() = 923
wait4(923, [WIFEXITED(s) && WEXITSTATUS(s) == 0], 0, NULL) = 923
rt_sigaction(SIGPIPE, {SIG_DFL}, {0x80933f0, [], SA_RESTART|0x4000000}, 8) = 0
sigreturn() = ? (mask now [])
--- SIGCHLD (Child exited) ---
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.