http://bugzilla.spamassassin.org/show_bug.cgi?id=3917





------- Additional Comments From [EMAIL PROTECTED]  2004-11-12 23:16 -------
Created an attachment (id=2513)
 --> (http://bugzilla.spamassassin.org/attachment.cgi?id=2513&action=view)
simplified server that demonstrates the problem (see following comments)

I have attached a perl server program that does the network stuff the same as
spamd and which demonstrates the problem while being much simplified.

To run this program use

 perl test2.pm 783

where the argument is the port it will use, default 783.

To demonstrate the problem use spamc to repeatedly send it a file consisting of
685 lines each of 75 letter 'a's. Here is the shell script that I used to do
that, with the file zs8.err being the 685 line test file.

myvar=0 ; while [ $myvar -ne 10 ] ; do spamc -x -l < zs8.err > zsa2.out ; echo
$?; myvar=$(( $myvar + 1 )) ; done

Anintersting thing about this is that while it did nor always fail, when it did
fail it was consistently at the same spot in the input file, independent of the
contents of the file:

spamc: failed sanity check, 53365 bytes claimed, 49152 bytes seen
76




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to