http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5642

           Summary: Server crash
           Product: Spamassassin
           Version: 3.2.3
          Platform: Other
        OS/Version: Linux
            Status: NEW
          Severity: critical
          Priority: P2
         Component: spamc/spamd
        AssignedTo: [email protected]
        ReportedBy: [EMAIL PROTECTED]


One of my servers freezed and crashed. There have been no other syslog messages
than from spamd and xinetd (which I suppose to be related to spamd failure).

3.2.3 has been installed a few days before. In front of that update, everything
worked fine. I'll post additional information if needed.

spamd is invoked with:

spamd -d -c -L

These are the only messages that appeared:
/var/log/warn:

Sep  6 15:16:29 server spamd[22626]: prefork: sysread(9) failed after 300 secs
at /usr/lib/perl5/site_perl/5.8.6/Mail/SpamAssassin/SpamdForkScaling.pm line 
642.
Sep  6 15:17:06 server relaylock: /var/qmail/bin/relaylock: mail from
200.6.174.38:4231 (not defined)
Sep  6 15:17:47 server spamd[22626]: prefork: empty order from parent at
/usr/lib/perl5/site_perl/5.8.6/Mail/SpamAssassin/SpamdForkScaling.pm line 587.
Sep  6 15:18:21 server spamc[27836]: skipped message, greater than max message
size (256000 bytes)
Sep  6 15:22:05 server spamd[2151]: syswrite() on closed filehandle GEN1662 at
/usr/lib/perl5/5.8.6/x86_64-linux-thread-multi/IO/Handle.pm line 451.
Sep  6 15:22:15 server xinetd[28054]: warning: can't get client address:
Connection reset by peer
Sep  6 15:22:15 server xinetd[28045]: warning: can't get client address:
Connection reset by peer
Sep  6 15:22:57 server spamd[2151]: Use of uninitialized value in concatenation
(.) or string at
/usr/lib/perl5/site_perl/5.8.6/Mail/SpamAssassin/SpamdForkScaling.pm line 488.
Sep  6 15:23:34 server spamd[2151]: prefork: killing rogue child 22626, failed
to write on fd :
Sep  6 15:23:42 server spamd[2151]: prefork: killing failed child 22626
fd=undefined at
/usr/lib/perl5/site_perl/5.8.6/Mail/SpamAssassin/SpamdForkScaling.pm line 171.
Sep  6 15:23:57 server spamd[2151]: prefork: killed child 22626
Sep  6 15:23:57 server xinetd[28196]: warning: can't get client address:
Connection reset by peer
Sep  6 15:25:02 server relaylock: /var/qmail/bin/relaylock: mail from
86.75.237.63:2219 (63.237.75-86.rev.gaoland.net)
Sep  6 15:25:38 server pop3d:


I can't tell if http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5404 is
related to this issue. It's another platform, but log entries look quite
similar, although related to 3.1.8.

btw: The link http://issues.apache.org/SpamAssassin/bugwritinghelp.html from the
'Enter Bug' intro text gives me a 404.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to