http://bugzilla.spamassassin.org/show_bug.cgi?id=4237
Summary: spamd syslog() SIGCHLD forkbomb
Product: Spamassassin
Version: 3.0.2
Platform: PC
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P5
Component: spamc/spamd
AssignedTo: [email protected]
ReportedBy: [EMAIL PROTECTED]
Running debian woody with the following packages:
ii spamassassin 3.0.2-0.backports.org.1
ii perl 5.6.1-8.9
ii syslog-ng 1.5.15-1.1
When syslog-ng is reloaded (after log rotation), spamd fails to write to syslog.
Sys::Syslog is configured to fallback to /dev/console (which it does with a
fork). When the child finishes and SIGCHLD is sent to the parent, another log
entry is attempted. This attempt also results in a failure, fork, SIGCHLD,
syslog(), repeat. See most closely related bug 3667, marked as duplicate of bug
3625. Existing spamd children continue to process spamc connections without
logging until they expire. New children are not spawned by the terminally
looped spamd parent. So, depending on mail volume, spamc connection processing
seems to fail at a random time after logrotation.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.