From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 98400 invoked by alias); 20 May 2015 22:55:00 -0000 Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org Received: (qmail 98385 invoked by uid 89); 20 May 2015 22:54:59 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.1 required=5.0 tests=AWL,BAYES_20,KAM_LAZY_DOMAIN_SECURITY,SPF_HELO_PASS,T_RP_MATCHES_RCVD autolearn=no version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Wed, 20 May 2015 22:54:59 +0000 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t4KMsuPl006602 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) for ; Wed, 20 May 2015 18:54:57 -0400 Received: from reynosa.quesejoda.com (unused [10.10.50.198] (may be forged)) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t4KMsqOX012160 for ; Wed, 20 May 2015 18:54:54 -0400 Message-ID: <555D10BA.3070208@redhat.com> Date: Wed, 20 May 2015 22:55:00 -0000 From: Aldy Hernandez User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: overseers@gcc.gnu.org Subject: Bounced messages to gcc-patches. Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-SW-Source: 2015-q2/txt/msg00039.txt.bz2 Hi folks. I sent a patch to gcc-patches today with the subject of "Re: [patch 10/10] debug-early merge: compiler proper". The first time it was silently dropped, but at least one of the recipients received it just fine. It had a 97k patch, which I thought could be the problem (size??). I tried again with a gziped patch and this time I received: ----- The following addresses had permanent fatal errors ----- (reason: 552 spam score exceeded threshold) ----- Transcript of session follows ----- ... while talking to gcc.gnu.org.: >>> DATA <<< 552 spam score exceeded threshold 554 5.0.0 Service unavailable The headers files in the message that was sent back from gcc.gnu.org did not have any indication as to why the spam socre was exceeded. Are my messages in limbo somewhere? Can they be released? Can I do anything to post my patch, or is this a subtle hint that should I consider vacation and/or retirement? Aldy