http://bugzilla.spamassassin.org/show_bug.cgi?id=3917
------- Additional Comments From [EMAIL PROTECTED] 2004-11-12 23:16 ------- Created an attachment (id=2513) --> (http://bugzilla.spamassassin.org/attachment.cgi?id=2513&action=view) simplified server that demonstrates the problem (see following comments) I have attached a perl server program that does the network stuff the same as spamd and which demonstrates the problem while being much simplified. To run this program use perl test2.pm 783 where the argument is the port it will use, default 783. To demonstrate the problem use spamc to repeatedly send it a file consisting of 685 lines each of 75 letter 'a's. Here is the shell script that I used to do that, with the file zs8.err being the 685 line test file. myvar=0 ; while [ $myvar -ne 10 ] ; do spamc -x -l < zs8.err > zsa2.out ; echo $?; myvar=$(( $myvar + 1 )) ; done Anintersting thing about this is that while it did nor always fail, when it did fail it was consistently at the same spot in the input file, independent of the contents of the file: spamc: failed sanity check, 53365 bytes claimed, 49152 bytes seen 76 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
