You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2011/06/03 16:34:58 UTC
[Bug 6611] Test Suite Failure: t/db_awl_perms.t Segmentation fault
with shell script.
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6611
--- Comment #1 from Mark Martinec <Ma...@ijs.si> 2011-06-03 14:34:58 UTC ---
> SA 3.3.2-rc2:
> t/db_awl_perms.t .................. sh: line 1: 7162 Segmentation fault
> /usr/bin/perl -T -w ../spamassassin.raw -C log/test_rules_copy --siteconfigpath
> log/localrules.tmp -p log/tst.cf --add-addr-to-whitelist
> whitelist_test@example.org > log/d.db_awl_perms/1
>
> System: Linux 2.6.39 (from source) under Slackware 64-bit 13.1
> Hardwr: 6-core AMD Opertron 2.8GHz, 32GB ram
> Shell: Bash 4.1.007 and Perl 5.14.0
My suspect is that a perl module to access a database (the BerkeleyDB
module presumably) was not reinstalled when perl was upgraded.
--
Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.