[Bug 175263] cannot report to Razor

2007-12-10 Thread Marcel Hild
Public bug reported:

Binary package hint: razor

when reporting spam via spamassassin razor complains:
report[3612]: reporter: razor2 report failed: report requires authentication at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 178. at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 326. 

But there actually is a identity, which is also read.
A strace reveals that it rather croaks on looking for something like:
Razor2/Preproc/deHTMLxs/DESTROY.al

This cannot be found. 
That might also be a perl problem?
perl 5.8.8-7ubuntu3.1

** Affects: razor (Ubuntu)
 Importance: Undecided
 Status: New

-- 
cannot report to Razor
https://bugs.launchpad.net/bugs/175263
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 175263] Re: cannot report to Razor

2007-12-10 Thread Marcel Hild

** Attachment added: strace.txt
   http://launchpadlibrarian.net/10821976/strace.txt

-- 
cannot report to Razor
https://bugs.launchpad.net/bugs/175263
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 175263] Re: cannot report to Razor

2007-12-10 Thread Marcel Hild
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm on  a up2date gutsy.
razor 2.810-2
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHXSQAEhnfFAtpDHURAi8FAJ0ZeQiX5+U2yIge2+QNbjSLyZ/DPQCcCcEB
HMyOm3XvpHQluFaCFAE7Q1Q=
=Hj8Z
-END PGP SIGNATURE-

-- 
cannot report to Razor
https://bugs.launchpad.net/bugs/175263
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 175263] Re: cannot report to Razor

2007-12-10 Thread Marcel Hild
great. I'm on i386.

-- 
cannot report to Razor
https://bugs.launchpad.net/bugs/175263
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 175263] Backported package from Debian unstable

2007-12-10 Thread Marcel Hild
The initial error was caused by me, because the identity file was owned by 
root, sorry.
Calling razor-report directly revealed that.
(And the strace files only shows a stat but no open of the identity :(

So, reporting with razor-report works now, with 2.81 and 2.84.
And reporting with spamassassin and spamc works as well...

Sorry for being stupid and thanks for the quick help :)

Cheers

-- 
cannot report to Razor
https://bugs.launchpad.net/bugs/175263
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 66249] Re: listing a large folder very slow on vfat partition

2007-11-28 Thread Marcel Hild
the last comment in the upstream bug worked for me.
I disabled accessibility in System-prefs-accessibilty and now its fast again

-- 
listing a large folder very slow on vfat partition
https://bugs.launchpad.net/bugs/66249
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 117957] Re: (gutsy)Need to modprobe nfs module before mounting nfs4 export

2007-10-16 Thread Marcel Hild
Also true for me.
I added nfs to /etc/modules as a workaround

-- 
(gutsy)Need to modprobe nfs module before mounting nfs4 export
https://bugs.launchpad.net/bugs/117957
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 148600] Kernel Oops with nfs4 mount

2007-10-03 Thread Marcel Hild
Public bug reported:

When accessing nfs4 mounts I get kernel 2 Oops.

On the server I am running the latest feisty version:
ii  nfs-common 1.0.12-4   NFS support files common to client and serve
ii  nfs-kernel-ser 1.0.12-4   support for NFS kernel server

On the client I am running the latest gutsy version:
ii  nfs-common  1:1.1.1~git-20070709-3ubuntu1   
NFS support files common to client and server
ii  nfs-kernel-server   1:1.1.1~git-20070709-3ubuntu1   
support for NFS kernel server

The Oops does not happen after the mount, but after some random read /
write time using the share.

Oct  3 17:15:42 rumo kernel: [112389.656000] Oops:  [#1]
Oct  3 17:15:42 rumo kernel: [112389.656000] SMP 
Oct  3 17:15:42 rumo kernel: [112389.656000] Modules linked in: isofs udf 
af_packet binfmt_misc rfcomm l2cap bluetooth nfsd exportfs thinkpad_acpi ppdev 
autofs4 fglrx(P) ipv6 acpi_cpufreq cpufreq_ondemand cpufreq_conservative 
cpufreq_stats freq_table cpufreq_powersave cpufreq_userspace ac container video 
battery sbs button bay dock nfs lockd sunrpc squashfs loop parport_pc lp 
parport irtty_sir sir_dev snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm 
snd_seq_dummy snd_seq_oss ipw3945 pcmcia snd_seq_midi snd_rawmidi 
snd_seq_midi_event snd_seq snd_timer snd_seq_device iTCO_wdt 
iTCO_vendor_support ieee80211 nsc_ircc ieee80211_crypt irda serio_raw pcspkr 
yenta_socket rsrc_nonstatic pcmcia_core crc_ccitt psmouse snd soundcore 
snd_page_alloc intel_agp agpgart shpchp pci_hotplug evdev ext3 jbd mbcache sg 
sr_mod cdrom sd_mod ata_generic usbhid hid ahci ata_piix ehci_hcd e1000 libata 
scsi_mod uhci_hcd usbcore dm_mirror dm_snapshot dm_mod thermal processor fan 
fuse apparmor commoncap
Oct  3 17:15:42 rumo kernel: [112389.656000] CPU:0
Oct  3 17:15:42 rumo kernel: [112389.656000] EIP:0060:[f8d30cf5]
Tainted: P   VLI
Oct  3 17:15:42 rumo kernel: [112389.656000] EFLAGS: 00010246   
(2.6.22-12-generic #1)
Oct  3 17:15:42 rumo kernel: [112389.656000] EIP is at 
nfs_update_inode+0xc5/0x6d0 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000] eax:    ebx: 81a4   
ecx: 81a4   edx: 8000
Oct  3 17:15:42 rumo kernel: [112389.656000] esi: 0006e007   edi: d5cdfe40   
ebp: d00b5890   esp: ca9d1dd8
Oct  3 17:15:42 rumo kernel: [112389.656000] ds: 007b   es: 007b   fs: 00d8  
gs: 0033  ss: 0068
Oct  3 17:15:42 rumo kernel: [112389.656000] Process umount.nfs4 (pid: 28956, 
ti=ca9d task=ddf2c000 task.ti=ca9d)
Oct  3 17:15:42 rumo kernel: [112389.656000] Stack: d00b5890 c02f373b 0001 
cf380800 0004  ddf2c000 cf64d6b0 
Oct  3 17:15:42 rumo kernel: [112389.656000]d00b5768 ca9d1e1c d00b5890 
01ab968e c01320c5 cf380780  d00b5890 
Oct  3 17:15:42 rumo kernel: [112389.656000]cf64d6b0 cf380780 d00b5890 
f8d326d4 cf64d600  f8d404fb cf64d600 
Oct  3 17:15:42 rumo kernel: [112389.656000] Call Trace:
Oct  3 17:15:42 rumo kernel: [112389.656000]  [out_of_line_wait_on_bit+123/144] 
out_of_line_wait_on_bit+0x7b/0x90
Oct  3 17:15:42 rumo kernel: [112389.656000]  [sigprocmask+101/256] 
sigprocmask+0x65/0x100
Oct  3 17:15:42 rumo kernel: [112389.656000]  [f8d326d4] 
nfs_post_op_update_inode+0x24/0x50 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000]  [f8d404fb] 
nfs4_proc_delegreturn+0x17b/0x180 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000]  [f8d4c867] 
nfs_do_return_delegation+0x17/0x30 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000]  [f8d2f2e9] 
nfs_dentry_iput+0x29/0x80 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000]  
[shrink_dcache_for_umount_subtree+130/560] 
shrink_dcache_for_umount_subtree+0x82/0x230
Oct  3 17:15:42 rumo kernel: [112389.656000]  [__wake_up_common+57/96] 
__wake_up_common+0x39/0x60
Oct  3 17:15:42 rumo kernel: [112389.656000]  [shrink_dcache_for_umount+55/80] 
shrink_dcache_for_umount+0x37/0x50
Oct  3 17:15:42 rumo kernel: [112389.656000]  [generic_shutdown_super+24/240] 
generic_shutdown_super+0x18/0xf0
Oct  3 17:15:42 rumo kernel: [112389.656000]  [kill_anon_super+9/64] 
kill_anon_super+0x9/0x40
Oct  3 17:15:42 rumo kernel: [112389.656000]  [f8d3328c] 
nfs_kill_super+0xc/0x20 [nfs]
Oct  3 17:15:42 rumo kernel: [112389.656000]  [deactivate_super+93/128] 
deactivate_super+0x5d/0x80
Oct  3 17:15:42 rumo kernel: [112389.656000]  [expire_mount_list+194/320] 
expire_mount_list+0xc2/0x140
Oct  3 17:15:42 rumo kernel: [112389.656000]  [shrink_submounts+179/208] 
shrink_submounts+0xb3/0xd0
Oct  3 17:15:43 rumo kernel: [112389.656000]  [sys_umount+265/624] 
sys_umount+0x109/0x270
Oct  3 17:15:43 rumo kernel: [112389.656000]  [dput+135/256] dput+0x87/0x100
Oct  3 17:15:43 rumo kernel: [112389.656000]  [__fput+299/416] 
__fput+0x12b/0x1a0
Oct  3 17:15:43 rumo kernel: [112389.656000]  [mntput_no_expire+36/160] 
mntput_no_expire+0x24/0xa0
Oct  3 17:15:43 rumo kernel: [112389.656000]  [sys_oldumount+23/32] 
sys_oldumount+0x17/0x20
Oct  3 17:15:43 

[Bug 144424] new upstream version available

2007-09-24 Thread Marcel Hild
Public bug reported:

Binary package hint: dvd95

there is 1.2p1 available since june07

** Affects: dvd95 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
new upstream version available
https://bugs.launchpad.net/bugs/144424
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 141485] rsnap and rub handlers not included

2007-09-21 Thread Marcel Hild
Public bug reported:

Binary package hint: backupninja

with version 0.9.4 rsnap and rub handlers have been added, but they are not 
included in the binary package.
same with debian package (see debian Bug#440554)

** Affects: backupninja (Ubuntu)
 Importance: Undecided
 Status: New

-- 
rsnap and rub handlers not included
https://bugs.launchpad.net/bugs/141485
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs