Your message dated Fri, 09 Mar 2012 09:17:11 +0000
with message-id <e1s5vwl-0003hs...@franck.debian.org>
and subject line Bug#646620: fixed in unattended-upgrades 0.76
has caused the Debian Bug report #646620,
regarding apt-get defunct when run on unattended-upgrades
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
646620: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646620
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unattended-upgrades
Version: 0.62.2
Severity: critical
This is the status of this machine right now:
root 1718 0.0 0.0 22912 1040 ? Ss Sep13 0:02 /usr/sbin/cron
root 29687 0.0 0.0 33292 1100 ? S Oct10 0:00 \_
/USR/SBIN/CRON
root 29688 0.0 0.0 11072 1304 ? Ss Oct10 0:00 \_
/bin/sh -c test -x /usr/sbin/anacron || ( cd / && run-parts --report
/etc/cron.daily )
root 29689 0.0 0.0 11076 676 ? S Oct10 0:00 \_
/bin/sh -c test -x /usr/sbin/anacron || ( cd / && run-parts --report
/etc/cron.daily )
root 29690 0.0 0.0 3852 588 ? S Oct10 0:00
\_ run-parts --report /etc/cron.daily
root 29692 0.0 0.0 0 0 ? Z Oct10 0:00
\_ [apt] <defunct>
As you can see it is 25th Oct now and the apt that is in a zombie state is
from the 10th, I've seen this happen on i386 and amd64 arches at least in
stable, I can't confirm if this has happened on testing/sid as well, but I
think I has happened to me on those as well before.
It seems weird I have not found this bug as it is hitting me from some time
now on machines at work and at home, I tried to look at /proc a bit to find
info on the process but didn't know what to look for and didn't find
anything relevant.
I hope to hear back from you soon and leave the process in that state in
case you want to have a look at some of the data of the running process or
similar.
Please tell me how to proceed from here as I don't know what info to add I
can tell you that this doesn't always happen, it happens from time to time.
I'm setting some of the machines with APT::Periodic::Verbose 3; to gather
some info on other machines that are also seing this.
Any other ideas on what to do?
Thanks in advance.
-- System Information:
Debian Release: 6.0.3
APT prefers stable
APT policy: (990, 'stable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages unattended-upgrades depends on:
ii apt 0.8.10.3+squeeze1 Advanced front-end for dpkg
ii apt-utils 0.8.10.3+squeeze1 APT utility programs
ii debconf [debconf-2.0] 1.5.36.1 Debian configuration management sy
ii lsb-release 3.2-23.2squeeze1 Linux Standard Base version report
ii python 2.6.6-3+squeeze6 interactive high-level object-orie
ii python-apt 0.7.100.1+squeeze1 Python interface to libapt-pkg
ii ucf 3.0025+nmu1 Update Configuration File: preserv
unattended-upgrades recommends no packages.
Versions of packages unattended-upgrades suggests:
ii bsd-mailx 8.1.2-0.20100314cvs-1 simple mail user agent
-- Configuration Files:
/etc/apt/apt.conf.d/50unattended-upgrades changed:
// Automatically upgrade packages from these (origin, archive) pairs
Unattended-Upgrade::Allowed-Origins {
"${distro_id} stable";
"${distro_id} ${distro_codename}-security";
// "${distro_id} ${distro_codename}-updates";
// "${distro_id} ${distro_codename}-proposed-updates";
};
// List of packages to not update
Unattended-Upgrade::Package-Blacklist {
// "vim";
// "libc6";
// "libc6-dev";
// "libc6-i686";
};
// Send email to this address for problems or packages upgrades
// If empty or unset then no email is sent, make sure that you
// have a working mail setup on your system. The package 'mailx'
// must be installed or anything that provides /usr/bin/mail.
Unattended-Upgrade::Mail "root@localhost";
// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
//Unattended-Upgrade::Remove-Unused-Dependencies "false";
// Automatically reboot *WITHOUT CONFIRMATION* if a
// the file /var/run/reboot-required is found after the upgrade
//Unattended-Upgrade::Automatic-Reboot "false";
// Use apt bandwidth limit feature, this example limits the download
// speed to 70kb/sec
//Acquire::http::Dl-Limit "70";
-- debconf information:
* unattended-upgrades/enable_auto_updates: true
--- End Message ---
--- Begin Message ---
Source: unattended-upgrades
Source-Version: 0.76
We believe that the bug you reported is fixed in the latest version of
unattended-upgrades, which is due to be installed in the Debian FTP archive:
unattended-upgrades_0.76.dsc
to main/u/unattended-upgrades/unattended-upgrades_0.76.dsc
unattended-upgrades_0.76.tar.gz
to main/u/unattended-upgrades/unattended-upgrades_0.76.tar.gz
unattended-upgrades_0.76_all.deb
to main/u/unattended-upgrades/unattended-upgrades_0.76_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 646...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Vogt <m...@debian.org> (supplier of updated unattended-upgrades package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Fri, 09 Mar 2012 09:42:33 +0100
Source: unattended-upgrades
Binary: unattended-upgrades
Architecture: source all
Version: 0.76
Distribution: unstable
Urgency: low
Maintainer: Michael Vogt <michael.v...@ubuntu.com>
Changed-By: Michael Vogt <m...@debian.org>
Description:
unattended-upgrades - automatic installation of security upgrades
Closes: 646620 652982
Changes:
unattended-upgrades (0.76) unstable; urgency=low
.
* add basic "Unattended-Upgrades::InstallOnShutdown" option to do
the install step on shutdown (closes: #652982) instead of doing
it in the backgroud while the machine is running
* test improvements
* fix mispelled "Unattended-Upgrade::MinimalSteps" (and add compat
mode)
* unattended-upgrade:
- cleanup FDs to hopefully fix zombies (closes: #646620)
Checksums-Sha1:
d3c190d2acb62e925d0e2e70e271144641fdb19e 986 unattended-upgrades_0.76.dsc
03e0a98d13f4cafd253ab562493a1da1a54bd450 65391 unattended-upgrades_0.76.tar.gz
09a4d2f35aaee18c9c8be85c12091a955c41bba5 38198 unattended-upgrades_0.76_all.deb
Checksums-Sha256:
b196c6d46a14a0a6ceeb076ca11adc768befb525e4e4e92218ff22d1d1768221 986
unattended-upgrades_0.76.dsc
3557a0a5ecf30cedd2d756cbb90137e34f84eed1a147efeb2516d2a637eab4b3 65391
unattended-upgrades_0.76.tar.gz
bbdeb3454dedbabb030808991ed6fa402344a83611ca9579a99d8660df739dd3 38198
unattended-upgrades_0.76_all.deb
Files:
8ef53463065c9c188c8cb8d5941329b7 986 admin optional
unattended-upgrades_0.76.dsc
805d39549f2b5a6b222bd655a1748b91 65391 admin optional
unattended-upgrades_0.76.tar.gz
3bae7d387f91c8577ca42b176c1463bb 38198 admin optional
unattended-upgrades_0.76_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAk9ZwzsACgkQliSD4VZixzSlQwCfQb6WGIE6ozmauoWO1uJ25TIe
LDMAn111e1ED5aPtJhCP7B3PuJYCS69l
=Kz1B
-----END PGP SIGNATURE-----
--- End Message ---