http://bugzilla.spamassassin.org/show_bug.cgi?id=4237

           Summary: spamd syslog() SIGCHLD forkbomb
           Product: Spamassassin
           Version: 3.0.2
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: spamc/spamd
        AssignedTo: [email protected]
        ReportedBy: [EMAIL PROTECTED]


Running debian woody with the following packages:
ii  spamassassin                                   3.0.2-0.backports.org.1
ii  perl                                           5.6.1-8.9 
ii  syslog-ng                                      1.5.15-1.1                  
              

When syslog-ng is reloaded (after log rotation), spamd fails to write to syslog.
 Sys::Syslog is configured to fallback to /dev/console (which it does with a
fork).  When the child finishes and SIGCHLD is sent to the parent, another log
entry is attempted.  This attempt also results in a failure, fork, SIGCHLD,
syslog(), repeat.  See most closely related bug 3667, marked as duplicate of bug
3625.  Existing spamd children continue to process spamc connections without
logging until they expire.  New children are not spawned by the terminally
looped spamd parent.  So, depending on mail volume, spamc connection processing
seems to fail at a random time after logrotation.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to