[Bug 175263] cannot report to Razor
Public bug reported: Binary package hint: razor when reporting spam via spamassassin razor complains: report[3612]: reporter: razor2 report failed: report requires authentication at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 178. at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 326. But there actually is a identity, which is also read. A strace reveals that it rather croaks on looking for something like: Razor2/Preproc/deHTMLxs/DESTROY.al This cannot be found. That might also be a perl problem? perl 5.8.8-7ubuntu3.1 ** Affects: razor (Ubuntu) Importance: Undecided Status: New -- cannot report to Razor https://bugs.launchpad.net/bugs/175263 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 175263] Re: cannot report to Razor
** Attachment added: strace.txt http://launchpadlibrarian.net/10821976/strace.txt -- cannot report to Razor https://bugs.launchpad.net/bugs/175263 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 175263] Re: cannot report to Razor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm on a up2date gutsy. razor 2.810-2 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFHXSQAEhnfFAtpDHURAi8FAJ0ZeQiX5+U2yIge2+QNbjSLyZ/DPQCcCcEB HMyOm3XvpHQluFaCFAE7Q1Q= =Hj8Z -END PGP SIGNATURE- -- cannot report to Razor https://bugs.launchpad.net/bugs/175263 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 175263] Re: cannot report to Razor
great. I'm on i386. -- cannot report to Razor https://bugs.launchpad.net/bugs/175263 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 175263] Backported package from Debian unstable
The initial error was caused by me, because the identity file was owned by root, sorry. Calling razor-report directly revealed that. (And the strace files only shows a stat but no open of the identity :( So, reporting with razor-report works now, with 2.81 and 2.84. And reporting with spamassassin and spamc works as well... Sorry for being stupid and thanks for the quick help :) Cheers -- cannot report to Razor https://bugs.launchpad.net/bugs/175263 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 66249] Re: listing a large folder very slow on vfat partition
the last comment in the upstream bug worked for me. I disabled accessibility in System-prefs-accessibilty and now its fast again -- listing a large folder very slow on vfat partition https://bugs.launchpad.net/bugs/66249 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 117957] Re: (gutsy)Need to modprobe nfs module before mounting nfs4 export
Also true for me. I added nfs to /etc/modules as a workaround -- (gutsy)Need to modprobe nfs module before mounting nfs4 export https://bugs.launchpad.net/bugs/117957 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 148600] Kernel Oops with nfs4 mount
Public bug reported: When accessing nfs4 mounts I get kernel 2 Oops. On the server I am running the latest feisty version: ii nfs-common 1.0.12-4 NFS support files common to client and serve ii nfs-kernel-ser 1.0.12-4 support for NFS kernel server On the client I am running the latest gutsy version: ii nfs-common 1:1.1.1~git-20070709-3ubuntu1 NFS support files common to client and server ii nfs-kernel-server 1:1.1.1~git-20070709-3ubuntu1 support for NFS kernel server The Oops does not happen after the mount, but after some random read / write time using the share. Oct 3 17:15:42 rumo kernel: [112389.656000] Oops: [#1] Oct 3 17:15:42 rumo kernel: [112389.656000] SMP Oct 3 17:15:42 rumo kernel: [112389.656000] Modules linked in: isofs udf af_packet binfmt_misc rfcomm l2cap bluetooth nfsd exportfs thinkpad_acpi ppdev autofs4 fglrx(P) ipv6 acpi_cpufreq cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table cpufreq_powersave cpufreq_userspace ac container video battery sbs button bay dock nfs lockd sunrpc squashfs loop parport_pc lp parport irtty_sir sir_dev snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss ipw3945 pcmcia snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device iTCO_wdt iTCO_vendor_support ieee80211 nsc_ircc ieee80211_crypt irda serio_raw pcspkr yenta_socket rsrc_nonstatic pcmcia_core crc_ccitt psmouse snd soundcore snd_page_alloc intel_agp agpgart shpchp pci_hotplug evdev ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic usbhid hid ahci ata_piix ehci_hcd e1000 libata scsi_mod uhci_hcd usbcore dm_mirror dm_snapshot dm_mod thermal processor fan fuse apparmor commoncap Oct 3 17:15:42 rumo kernel: [112389.656000] CPU:0 Oct 3 17:15:42 rumo kernel: [112389.656000] EIP:0060:[f8d30cf5] Tainted: P VLI Oct 3 17:15:42 rumo kernel: [112389.656000] EFLAGS: 00010246 (2.6.22-12-generic #1) Oct 3 17:15:42 rumo kernel: [112389.656000] EIP is at nfs_update_inode+0xc5/0x6d0 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] eax: ebx: 81a4 ecx: 81a4 edx: 8000 Oct 3 17:15:42 rumo kernel: [112389.656000] esi: 0006e007 edi: d5cdfe40 ebp: d00b5890 esp: ca9d1dd8 Oct 3 17:15:42 rumo kernel: [112389.656000] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 Oct 3 17:15:42 rumo kernel: [112389.656000] Process umount.nfs4 (pid: 28956, ti=ca9d task=ddf2c000 task.ti=ca9d) Oct 3 17:15:42 rumo kernel: [112389.656000] Stack: d00b5890 c02f373b 0001 cf380800 0004 ddf2c000 cf64d6b0 Oct 3 17:15:42 rumo kernel: [112389.656000]d00b5768 ca9d1e1c d00b5890 01ab968e c01320c5 cf380780 d00b5890 Oct 3 17:15:42 rumo kernel: [112389.656000]cf64d6b0 cf380780 d00b5890 f8d326d4 cf64d600 f8d404fb cf64d600 Oct 3 17:15:42 rumo kernel: [112389.656000] Call Trace: Oct 3 17:15:42 rumo kernel: [112389.656000] [out_of_line_wait_on_bit+123/144] out_of_line_wait_on_bit+0x7b/0x90 Oct 3 17:15:42 rumo kernel: [112389.656000] [sigprocmask+101/256] sigprocmask+0x65/0x100 Oct 3 17:15:42 rumo kernel: [112389.656000] [f8d326d4] nfs_post_op_update_inode+0x24/0x50 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] [f8d404fb] nfs4_proc_delegreturn+0x17b/0x180 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] [f8d4c867] nfs_do_return_delegation+0x17/0x30 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] [f8d2f2e9] nfs_dentry_iput+0x29/0x80 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_dcache_for_umount_subtree+130/560] shrink_dcache_for_umount_subtree+0x82/0x230 Oct 3 17:15:42 rumo kernel: [112389.656000] [__wake_up_common+57/96] __wake_up_common+0x39/0x60 Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_dcache_for_umount+55/80] shrink_dcache_for_umount+0x37/0x50 Oct 3 17:15:42 rumo kernel: [112389.656000] [generic_shutdown_super+24/240] generic_shutdown_super+0x18/0xf0 Oct 3 17:15:42 rumo kernel: [112389.656000] [kill_anon_super+9/64] kill_anon_super+0x9/0x40 Oct 3 17:15:42 rumo kernel: [112389.656000] [f8d3328c] nfs_kill_super+0xc/0x20 [nfs] Oct 3 17:15:42 rumo kernel: [112389.656000] [deactivate_super+93/128] deactivate_super+0x5d/0x80 Oct 3 17:15:42 rumo kernel: [112389.656000] [expire_mount_list+194/320] expire_mount_list+0xc2/0x140 Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_submounts+179/208] shrink_submounts+0xb3/0xd0 Oct 3 17:15:43 rumo kernel: [112389.656000] [sys_umount+265/624] sys_umount+0x109/0x270 Oct 3 17:15:43 rumo kernel: [112389.656000] [dput+135/256] dput+0x87/0x100 Oct 3 17:15:43 rumo kernel: [112389.656000] [__fput+299/416] __fput+0x12b/0x1a0 Oct 3 17:15:43 rumo kernel: [112389.656000] [mntput_no_expire+36/160] mntput_no_expire+0x24/0xa0 Oct 3 17:15:43 rumo kernel: [112389.656000] [sys_oldumount+23/32] sys_oldumount+0x17/0x20 Oct 3 17:15:43
[Bug 144424] new upstream version available
Public bug reported: Binary package hint: dvd95 there is 1.2p1 available since june07 ** Affects: dvd95 (Ubuntu) Importance: Undecided Status: New -- new upstream version available https://bugs.launchpad.net/bugs/144424 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 141485] rsnap and rub handlers not included
Public bug reported: Binary package hint: backupninja with version 0.9.4 rsnap and rub handlers have been added, but they are not included in the binary package. same with debian package (see debian Bug#440554) ** Affects: backupninja (Ubuntu) Importance: Undecided Status: New -- rsnap and rub handlers not included https://bugs.launchpad.net/bugs/141485 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs