gpg: fatal: zlib inflate problem: incorrect data check
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Duplicity |
New
|
Undecided
|
Unassigned |
Bug Description
duplicity 0.6.11
Python 2.6.5
Linux SOUTH 2.6.32-27-generic #49-Ubuntu SMP Thu Dec 2 00:51:09 UTC 2010 x86_64 GNU/Linux
This has been an issue for some time (pre 0.6.8b through 0.6.11).
I create the incident by performing a full backup of a data repository path to a mounted drive on the same system. The failure is produced when attempting to verify, restore or file restore the specific file which fails.
Repository backup call:
nohup duplicity --encrypt-key "8ABB1A41" --sign-key "8ABB1A41" --verbosity 9 "/media/
No errors or warnings are issued during the backup phase:
AsyncScheduler: running task synchronously (asynchronicity disabled)
Writing /media/
Deleting /tmp/duplicity-
Forgetting temporary file /tmp/duplicity-
AsyncScheduler: task completed successfully
Processed volume 1147
Registering (mktemp) temporary file /tmp/duplicity-
AsyncScheduler: running task synchronously (asynchronicity disabled)
Writing /media/
Deleting /tmp/duplicity-
Forgetting temporary file /tmp/duplicity-
AsyncScheduler: task completed successfully
Processed volume 1148
Registering (mktemp) temporary file /tmp/duplicity-
AsyncScheduler: running task synchronously (asynchronicity disabled)
Writing /media/
Deleting /tmp/duplicity-
Forgetting temporary file /tmp/duplicity-
AsyncScheduler: task completed successfully
Processed volume 1149
.
.
.
File duplicity-
Found backup chain [Fri Feb 4 22:17:47 2011]-[Fri Feb 4 22:17:47 2011]
--------------[ Backup Statistics ]--------------
StartTime 1296886667.37 (Fri Feb 4 22:17:47 2011)
EndTime 1296901383.13 (Sat Feb 5 02:23:03 2011)
ElapsedTime 14715.76 (4 hours 5 minutes 15.76 seconds)
SourceFiles 50598
SourceFileSize 129262183781 (120 GB)
NewFiles 50598
NewFileSize 129262183781 (120 GB)
DeletedFiles 0
ChangedFiles 0
ChangedFileSize 0 (0 bytes)
ChangedDeltaSize 0 (0 bytes)
DeltaEntries 50598
RawDeltaSize 129247782245 (120 GB)
TotalDestinatio
Errors 0
-------
Removing still remembered temporary file /tmp/duplicity-
During verify, restore and file restore, the following occurs which terminates the restore process:
nohup duplicity restore --encrypt-key 8ABB1A41 --sign-key 8ABB1A41 --ignore-errors --verbosity 9 "file:/
OR
duplicity --encrypt-key 8ABB1A41 --sign-key 8ABB1A41 --verbosity debug --file-to-restore "Photo Archive/
where the file "Archive/
Running in 'ignore errors' mode due to --ignore-errors; please re-consider if this was not intended
Using archive dir: /root/.
Using backup name: 0543e0fc57cd727
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Import of duplicity.
Main action: restore
=======
duplicity 0.6.11 (November 20, 2010)
Args: /usr/local/
Linux SOUTH 2.6.32-27-generic #49-Ubuntu SMP Thu Dec 2 00:51:09 UTC 2010 x86_64
/usr/bin/python 2.6.5 (r265:79063, Apr 16 2010, 13:57:41)
[GCC 4.4.3]
=======
Using temporary directory /tmp/duplicity-
Registering (mkstemp) temporary file /tmp/duplicity-
Temp has 136185794560 available, backup will use approx 34078720.
Synchronizing remote metadata to local cache...
Copying duplicity-
Registering (mktemp) temporary file /tmp/duplicity-
Deleting /tmp/duplicity-
Forgetting temporary file /tmp/duplicity-
Copying duplicity-
Registering (mktemp) temporary file /tmp/duplicity-
Deleting /tmp/duplicity-
Forgetting temporary file /tmp/duplicity-
4776 files exist on backend
2 files exist in cache
.
.
.
Writing Photo Archive/
Writing Photo Archive/
Removing still remembered temporary file /tmp/duplicity-
Removing still remembered temporary file /tmp/duplicity-
GPG error detail: Traceback (most recent call last):
File "/usr/local/
with_
File "/usr/local/
fn()
File "/usr/local/
restore(
File "/usr/local/
restore_
File "/usr/local/
ITR( ropath.index, ropath )
File "/usr/local/
last_
File "/usr/local/
return function(*args)
File "/usr/local/
ropath.copy( self.base_
File "/usr/local/
other.
File "/usr/local/
buf = fin.read(
File "/usr/local/
if not self.addtobuffer():
File "/usr/local/
self.
File "/usr/local/
self.
File "/usr/local/
assert not self.current_
File "/usr/local/
assert not self.fileobj.
File "/usr/local/
self.
File "/usr/local/
raise GPGError, msg
GPGError: GPG Failed, see log below:
===== Begin GnuPG log =====
gpg: encrypted with 2048-bit RSA key, ID 73B4F60A, created 2010-09-02
"Firstname Lastname(Duplicity key) <email address hidden>"
gpg: fatal: zlib inflate problem: incorrect data check
secmem usage: 2624/5664 bytes in 6/16 blocks of pool 5856/32768
===== End GnuPG log =====
I am willing to provide access to the appropriate engineer if required. The bug has delayed me over a year from using Duplicity, but now that Mozy is jacking up their rates time to resolution is more critical.
Thanks,
-W
When mod priviledges are modified back to a typical 755, the extracted file "19950817 Fort Lauderdale 08.jpg" appears (image wise) as the first 75% of he original file. The lower 25% of the image is missing. So it seems that the last portion of the file has not been extracted.
I have identified the volume containing the failure The offending file
"19950817 Fort Lauderdale 08.jpg" exists across the volume boundary, spans 19
segments from th last part of vol582 into vol583. The first volume (vol582) produces a gpg fatal error. The second volume (vol583) does not (see below).
gpg --decrypt /media/ Poodle/ backup/ media/MadDog/ Archive/ duplicity- full.20110205T0 61747Z. vol582. difftar. gpg > duplicity.difftar
You need a passphrase to unlock the secret key for
user: "First Last(Duplicity key) <email address hidden>"
2048-bit RSA key, ID 73B4F60A, created 2010-09-02 (main key ID 8ABB1A41)
gpg: gpg-agent is not available in this session
gpg: encrypted with 2048-bit RSA key, ID 73B4F60A, created 2010-09-02
"FIrst Last(Duplicity key) <email address hidden>"
gpg: fatal: zlib inflate problem: incorrect data check
secmem usage: 2400/5440 bytes in 5/15 blocks of pool 5632/32768
When duplicity- full.20110205T0 61747Z. vol582. difftar. gpg
is decrypted and extracted, the volume snapshot appears as:
. snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 07.jpg/22 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 07.jpg/23 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 07.jpg/24 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/1 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/2 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/3 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/4 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/5 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/6 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/7 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/8 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/9 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/10 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/11 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/12 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/13 snapshot/ Photo Archive/ 1995/19950817 Fort Lauderdale 08.jpg/14
.
.
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
multivol_
The sequential volume duplicity- full.20110205T0 61747Z. vol583. difftar. gpg
(vol583):
gpg --decrypt /media/ Poodle/ backup/ media/MadDog/ Archive/ duplicity- full.20110205T0 61747Z. vol583. difftar. gpg > duplicity.difftar
You need a passphrase to unlock the secret key for
user: "First Last(Duplicity key) <email address hidden>"
2048-bit RSA key, ID 73B4F60A, created 2010-09-02 (main key ID 8ABB1A41)
gpg: gpg-agent is not available in this session
gpg: encrypted with 2048-bit RSA key, ID 73B4F60A, created 2010-09-02
"First Last(Duplicity key) <email address hidden>"
gpg: Signature made Fri 04 Feb 2011 10:50:42 PM PST using RSA ...