You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2011/06/03 16:34:58 UTC

[Bug 6611] Test Suite Failure: t/db_awl_perms.t Segmentation fault with shell script.

https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6611

--- Comment #1 from Mark Martinec <Ma...@ijs.si> 2011-06-03 14:34:58 UTC ---
> SA 3.3.2-rc2:
> t/db_awl_perms.t .................. sh: line 1:  7162 Segmentation fault      
> /usr/bin/perl -T -w ../spamassassin.raw -C log/test_rules_copy --siteconfigpath
> log/localrules.tmp -p log/tst.cf --add-addr-to-whitelist
> whitelist_test@example.org > log/d.db_awl_perms/1
> 
> System:  Linux 2.6.39 (from source) under Slackware 64-bit 13.1
> Hardwr:  6-core AMD Opertron 2.8GHz, 32GB ram
> Shell:   Bash 4.1.007  and  Perl 5.14.0

My suspect is that a perl module to access a database (the BerkeleyDB
module presumably) was not reinstalled when perl was upgraded.

-- 
Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.