http://bugzilla.spamassassin.org/show_bug.cgi?id=3917





------- Additional Comments From [EMAIL PROTECTED]  2004-11-02 04:16 -------
sleep(5) between the call to shutdown and the close doesn't help at all.

I added a -l option to the call to spamc -x to see the error. Tthe results are
interesting. I'm testing with two different email messages. Each test consists
of calling spamc with the message that I am testing with, printing out the
return ocde, sleeping 5 seconds, then repeating. The error output with -l is
about a mismatch in the number of bytes expected and the number received from
spamd. Each message is consistent in how many bytes are received when it
truncates. They are each different, but totally consistent for any one message.
It is not like a single packet loss. One shows 78130 bytes claimed, 33792 bytes
seen, the other 109053 bytes claimed, 41984 bytes seen.

But here's kicker. I tested using the first 39166 bytes of the message of the
first test. It also showed 33792 bytes seen, in other words shutting down the
connection at the exact same place. That indicates some kind of dependency on
the content of the message.
 
I tried adding immediately after $client = $server->accept()

 setsockopt($client, SOL_SOCKET, SO_LINGER, pack("II", 1, 0)) or 
      warn "Can't set SO_LINGER on for socket: $!";

and it did not help. Neither did

setsockopt($client, SOL_SOCKET, SO_LINGER, pack("II", 1, 5)) or 
      warn "Can't set SO_LINGER on for socket: $!";

I still don't have a test case that is independent of spamd, but I have a start
at the server side of it.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to