Your message dated Sat, 17 Sep 2022 17:48:44 +0000
with message-id <e1ozbvo-008ufq...@fasolo.debian.org>
and subject line Bug#1019588: fixed in jdupes 1.21.0-2
has caused the Debian Bug report #1019588,
regarding jdupes: BTRFS deduplication broken by new update
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1019588: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019588
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jdupes
Version: 1.21.0-1
Severity: normal
Dear Maintainer,
When running jdupes -rB ./ in a folder on a BTRFS filesystem, I got
errors for every file:
eg,
[SRC] ./.git/logs/HEAD
-XX-> ./.git/logs/refs/heads/master
error: Inappropriate ioctl for device (25)
I have been running jdupes -B fairly regularly on various files on my
device; the problems have only
started now, after the most recent update of jdupes. I'm wondering if
the kernel API for
file deduplication changed, or
strace says this is the called ioctl:
ioctl(3, _IOC(_IOC_READ|_IOC_WRITE, 0x5e, 0x36, 0x18), 0x55732fa9b4e0)
= -1 ENOTTY (Inappropriate ioctl for device)
The bug is in upstream: in commit 0027bb2c8, the new static header
incorrectly states the
literal: it transforms BTRFS_IOCTL_MAGIC from the hexadecimal 0x94
(decimal 148) to the decimal 94
This is problematic: the patch is fairly trivial (add 0x to line 23 of
linux-dedupe-static.h).
I do wonder why the static header is used, rather than the proper
kernel headers.
I'll also put this bug upstream, filing it here because I started the
report before I
finished poking around it's cause.
Thanks!
Calum McConnell
-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 5.19.0-1-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages jdupes depends on:
ii libc6 2.34-7
jdupes recommends no packages.
jdupes suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: jdupes
Source-Version: 1.21.0-2
Done: Joao Eriberto Mota Filho <eribe...@debian.org>
We believe that the bug you reported is fixed in the latest version of
jdupes, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1019...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eribe...@debian.org> (supplier of updated jdupes
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 17 Sep 2022 12:53:25 -0300
Source: jdupes
Architecture: source
Version: 1.21.0-2
Distribution: unstable
Urgency: medium
Maintainer: Joao Eriberto Mota Filho <eribe...@debian.org>
Changed-By: Joao Eriberto Mota Filho <eribe...@debian.org>
Closes: 1019588
Changes:
jdupes (1.21.0-2) unstable; urgency=medium
.
* debian/patches/010_fix-dedup-btrfs.patch: created to fix BTRFS
deduplication broken since upstream/1.21.0. Thanks to Calum
McConnell <calumlikesapple...@gmail.com>. (Closes: #1019588)
* debian/tests/control: improved all tests making checks over the results.
Checksums-Sha1:
21398a3f62a786a92838150c7329b018c964e2d4 1887 jdupes_1.21.0-2.dsc
91a0fec139a3e38acf319b3fb7da37f93278239e 13888 jdupes_1.21.0-2.debian.tar.xz
6ef1555c5d99c18c2364d9f273d41fcbcc079e13 5813 jdupes_1.21.0-2_source.buildinfo
Checksums-Sha256:
f606ec9d805e604f6bbdaa8a08c9c104daf520a248bbc68d46459bfcf69dd05b 1887
jdupes_1.21.0-2.dsc
f99aa339da8c9a13f6781202b4f2250bd2ffb0dc1a6abd6629b6f4830a7a99f7 13888
jdupes_1.21.0-2.debian.tar.xz
ddc7c752213a31da4185cdcc993093f3d1526817447f5e0365c3e8345264f930 5813
jdupes_1.21.0-2_source.buildinfo
Files:
01a54e5f49667e56dd37c9e74a261d06 1887 utils optional jdupes_1.21.0-2.dsc
89faf4d4cba22dc4ae46f5df06862bb2 13888 utils optional
jdupes_1.21.0-2.debian.tar.xz
a133750f14f98b8820faded592b85cb4 5813 utils optional
jdupes_1.21.0-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=HdqU
-----END PGP SIGNATURE-----
--- End Message ---