Can you verify that it's not in the "child create/due" loop?
Tailing my log, I see the following:

2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: server started on UNIX
domai
n socket /dev/spamd (running version 3.2.2)
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: server pid: 4553
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4556
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4557
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4558
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: prefork: child states: SSS
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: prefork: server reached
--max-child
ren setting, consider raising it
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: prefork: child states: SSS
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: prefork: server reached
--max-child
ren setting, consider raising it
2007 Jul 25 08:41:01 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4556 due to SIGCHLD
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: server successfully
spawned
:
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4558 due to SIGCHLD
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: prefork: child states: S
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4560
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4561
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4559 due to SIGCHLD
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4560 due to SIGCHLD
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: prefork: child states: S
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4562
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: server successfully
spawned
child process, pid 4563
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: prefork: child states: SSS
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: prefork: server reached
--max-child
ren setting, consider raising it
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4561 due to SIGCHLD
2007 Jul 25 08:41:02 ThreatWall spamd[4553]: spamd: handled cleanup of child
pid
 4562 due to SIGCHLD
....

        Until I kill the parent spamd process.  I run it with:

/usr/bin/spamd -d -x --max-conn-per-child=20 --socketpath=/dev/spamd
--socketgroup=mail -m3 --min-spare=3 -u mail

 Chris

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 25, 2007 9:06 AM
To: Chris Blaise
Cc: users@spamassassin.apache.org
Subject: Re: ANNOUNCE: Apache SpamAssassin 3.2.2 available 


Chris Blaise writes:
>       When starting up on a Perl 5.6.1 system under x86 Linux, spamd goes
> into a child spawn/die loop because of the fix for bug 5518 which replaces
> the previous set uid/gid routines fails and causes the newly spawned child
> to immediately die.
> 
>       Is Perl 5.6.1 no longer the lowest support version?

works fine for me with perl 5.6.1; make test passes:

t/spamd.....................ok
t/spamd_allow_user_rules....ok
t/spamd_hup.................ok
t/spamd_kill_restart........ok
[.etc.]

and 'sudo make test TEST_FILES=t/root_spamd*' similarly passes:

t/root_spamd....................ok
t/root_spamd_tell...............ok
t/root_spamd_tell_paranoid......ok
t/root_spamd_tell_x.............ok
t/root_spamd_tell_x_paranoid....ok
t/root_spamd_x..................ok
t/root_spamd_x_paranoid.........ok
All tests successful.

--j.

Reply via email to