Your message dated Wed, 09 Mar 2016 23:19:54 +0000
with message-id <e1adnou-0004z5...@franck.debian.org>
and subject line Bug#805066: fixed in backup2l 1.5-8
has caused the Debian Bug report #805066,
regarding backup2l: Parallel invocation sometimes overwrites current 
in-progress backup
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
805066: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805066
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: backup2l
Version: 1.5-6
Severity: normal
File: /usr/bin/backup2l

Dear Maintainer,

recently a new level-1 backup was created which took more than one day
to complete.  With backup2l being run from /etc/cron.daily this lead to
a second concurrent 'backup2l -b' invocation.

For some reason the lock-file check was not effective and the second
invocation (partially) overwrote the backup-files that had been building
for 24 hours.

Looking at the source code I see at least one problem: umount_dev is run
unconditionally at the end of script.  umount_dev also removes the
lock-file.  So while backup2l is running, I can accidentally remove the
lock-file by merely inovking backup2l with an invalid command line
option:

$ backup2l -b
(switch to other console)
$ backup2l -b
ERROR: Backup volume is locked.
(so far so good)
$ backup2l --summary
Usage: backup2l [-c <conffile>] [-t <BID>] <command>
(lock-file now gone)
$ backup2l -b
[..]
Running pre-backup procedure...

I'm not sure whether this is the scenario that hit me when backup2l
started to overwrite its own backup, but it's the only way I am
currently able to reproduce the problem.

cheers,

David

-- System Information:
Debian Release: 7.9
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: mipsel (mips64)

Kernel: Linux 2.6.39.4-dk1-fix2
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

backup2l depends on no packages.

Versions of packages backup2l recommends:
ii  bzip2  1.0.6-4

backup2l suggests no packages.

-- 
GnuPG public key: http://dvdkhlng.users.sourceforge.net/dk2.gpg
Fingerprint: B63B 6AF2 4EEB F033 46F7  7F1D 935E 6F08 E457 205F

--- End Message ---
--- Begin Message ---
Source: backup2l
Source-Version: 1.5-8

We believe that the bug you reported is fixed in the latest version of
backup2l, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 805...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn <joodeb...@joonet.de> (supplier of updated backup2l package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 10 Mar 2016 00:08:22 +0100
Source: backup2l
Binary: backup2l
Architecture: source all
Version: 1.5-8
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn <joodeb...@joonet.de>
Changed-By: Joachim Wiedorn <joodeb...@joonet.de>
Description:
 backup2l   - low-maintenance backup/restore tool
Closes: 805066 816219
Changes:
 backup2l (1.5-8) unstable; urgency=medium
 .
   * Add patches:
     - Remove TMP* before POST_BACKUP (better while using rsync).
     - Avoid parallel invocation of backup2l. Closes: #805066
     - Fix for grep (>2.20) with encoded filenames. Closes: #816219
   * Update debian/control:
     - Bump to Standards Version 3.9.7 (no changes).
     - Update Vcs Git and Browser URLs to secure protocol.
   * Update debian/copyright.
Checksums-Sha1:
 4f433f4358f4bed611ada8714360c876c60d0bba 1645 backup2l_1.5-8.dsc
 f3d8d773efd7c31928c478e61d05c383111fbf90 16672 backup2l_1.5-8.debian.tar.xz
 c9b31c80a4295024fb0e46dd6ec4efb1bdb159e6 34068 backup2l_1.5-8_all.deb
Checksums-Sha256:
 9825e8fb7f01f274d8e28e842ad423f7798c5733441a83b36527c4a373897a48 1645 
backup2l_1.5-8.dsc
 636e27183bad6c4df3575aa206fd38a011548c207b60a0fd855df9d1bc3fe9e6 16672 
backup2l_1.5-8.debian.tar.xz
 20ebd599444e6b57624e75f8a7326ce7002f9370a77e970d8799df65edeb53bb 34068 
backup2l_1.5-8_all.deb
Files:
 59de5657c2b789be1c88d1c42ac9944a 1645 admin optional backup2l_1.5-8.dsc
 3bcf27c096453f56f0907eff3b8a20de 16672 admin optional 
backup2l_1.5-8.debian.tar.xz
 c8cb76e097ffaf1c7b9e15328fe9cb07 34068 admin optional backup2l_1.5-8_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=rcPh
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to