ceph.git
2 days agoMerge version 14.2.21-1+rpi1 and 14.2.21-1+deb11u2 to produce 14.2.21-1+rpi1+deb11u2 bullseye-staging archive/raspbian/14.2.21-1+rpi1+deb11u2 raspbian/14.2.21-1+rpi1+deb11u2
Raspbian automatic forward porter [Tue, 3 Feb 2026 02:28:28 +0000 (02:28 +0000)]
Merge version 14.2.21-1+rpi1 and 14.2.21-1+deb11u2 to produce 14.2.21-1+rpi1+deb11u2

7 weeks agoMerge ceph (14.2.21-1+deb11u2) import into refs/heads/workingbranch
Utkarsh Gupta [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Merge ceph (14.2.21-1+deb11u2) import into refs/heads/workingbranch

7 weeks ago[PATCH] Check if `HTTP_X_AMZ_COPY_SOURCE` header is empty
Suyash Dongre [Wed, 20 Aug 2025 17:52:41 +0000 (23:22 +0530)]
[PATCH] Check if `HTTP_X_AMZ_COPY_SOURCE` header is empty

The issue was that the `HTTP_X_AMZ_COPY_SOURCE` header could be present but empty (i.e., an empty string rather than NULL). The  code only checked if the pointer was not NULL, but didn't verify that the string had content. When an empty string was passed to RGWCopyObj::parse_copy_location(), it would eventually try to access name_str[0] on an empty string, causing a crash.

Fixes: https://tracker.ceph.com/issues/72669
Signed-off-by: Suyash Dongre <suyashd999@gmail.com>
Gbp-Pq: Name CVE-2024-47866.patch

7 weeks ago[PATCH 1/4] mgr/volumes: Fix subvolume discover during upgrade
Kotresh HR [Fri, 22 Jul 2022 07:53:39 +0000 (13:23 +0530)]
[PATCH 1/4] mgr/volumes: Fix subvolume discover during upgrade

Fixes the subvolume discover to use the correct
metadata file after an upgrade from legacy subvolume
to v1. The fix makes sure, it doesn't use the
handcrafted metadata file placed in the subvolume
root of legacy subvolume.

Co-authored-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@cern.ch>
Co-authored-by: Dan van der Ster <daniel.vanderster@cern.ch>
Co-authored-by: Ramana Raja <rraja@redhat.com>
Signed-off-by: Kotresh HR <khiremat@redhat.com>
Gbp-Pq: Name CVE-2022-0670.patch

7 weeks ago[PATCH] client: prohibit unprivileged users from setting sgid/suid bits
Kefu Chai [Sat, 5 Jul 2025 08:23:36 +0000 (16:23 +0800)]
[PATCH] client: prohibit unprivileged users from setting sgid/suid  bits

Prior to fb1b72d, unprivileged users could add mode bits as long as
S_ISUID and S_ISGID were not included in the change.

After fb1b72d, unprivileged users were allowed to modify S_ISUID and
S_ISGID bits only when no other mode bits were changed in the same
operation. This inadvertently permitted unprivileged users to set
S_ISUID and/or S_ISGID bits when they were the sole bits being modified.

This behavior should not be allowed. Unprivileged users should be
prohibited from setting S_ISUID and/or S_ISGID bits under any
circumstances.

This change tightens the permission check to prevent unprivileged
users from setting these privileged bits in all cases.

Signed-off-by: Kefu Chai <tchaikov@gmail.com>
origin: backport, https://github.com/ceph/ceph/commit/7028ed21138522495df1e9f8b01195a3c43d47ff
bug-debian: https://bugs.debian.org/1109470
bug: https://github.com/ceph/ceph/pull/64356

Gbp-Pq: Name CVE-2025-52555-2.patch

7 weeks ago[PATCH] client: disallow unprivileged users to escalate root privileges
Xiubo Li [Wed, 3 Apr 2024 11:02:08 +0000 (19:02 +0800)]
[PATCH] client: disallow unprivileged users to escalate root  privileges

An unprivileged user can `chmod 777` a directory owned by root
and gain access. Fix this bug and also add a test case for the
same.

Signed-off-by: Xiubo Li <xiubli@redhat.com>
Signed-off-by: Venky Shankar <vshankar@redhat.com>
origin: backport, https://github.com/ceph/ceph/commit/b6d85b595ea7c9e0fca10d5e77a48102110fe22c
bug-github-pull: https://github.com/ceph/ceph/pull/60314
bug: https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm
bug-debian: https://bugs.debian.org/1108410

Gbp-Pq: Name CVE-2025-52555-1.patch

7 weeks agoCVE-2023-43040 rgw: Fix bucket validation against POST policies
Joshua Baergen [Wed, 17 May 2023 18:17:09 +0000 (12:17 -0600)]
CVE-2023-43040 rgw: Fix bucket validation against POST policies

It's possible that user could provide a form part as a part of a POST
object upload that uses 'bucket' as a key; in this case, it was
overriding what was being set in the validation env (which is the real
bucket being modified). The result of this is that a user could actually
upload to any bucket accessible by the specified access key by matching
the bucket in the POST policy in said POST form part.

Fix this simply by setting the bucket to the correct value after the
POST form parts are processed, ignoring the form part above if
specified.

bug: https://tracker.ceph.com/issues/63004
bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690
bug-debian-security: https://deb.freexian.com/extended-lts/tracker/CVE-2023-43040

Signed-off-by: Joshua Baergen <jbaergen@digitalocean.com>
origin: backport, https://github.com/ceph/ceph/commit/479976538fe8f51edfea597443ba0c0209d3f39f

Gbp-Pq: Name CVE-2023-43040.patch

7 weeks agoceph-volume: honour osd_dmcrypt_key_size option
Guillaume Abrioux [Tue, 25 Jan 2022 09:25:53 +0000 (10:25 +0100)]
ceph-volume: honour osd_dmcrypt_key_size option

ceph-volume doesn't honour osd_dmcrypt_key_size.
It means the default size is always applied.

It also changes the default value in `get_key_size_from_conf()`

From cryptsetup manpage:

> For XTS mode you can optionally set a key size of 512 bits with the -s option.

Using more than 512bits will end up with the following error message:

```
Key size in XTS mode must be 256 or 512 bits.
```

Fixes: https://tracker.ceph.com/issues/54006
Signed-off-by: Guillaume Abrioux <gabrioux@redhat.com>
(cherry picked from commit 47c33179f9a15ae95cc1579a421be89378602656)

origin: https://github.com/ceph/ceph/commit/f69339e00f582ec64b843ff58b66817975fca0d7
bug: https://tracker.ceph.com/issues/54006

Gbp-Pq: Name CVE-2021-3979.patch

7 weeks agoCVE-2022-3650: ceph-crash: fix stderr handling
Tim Serong [Wed, 2 Nov 2022 03:23:20 +0000 (14:23 +1100)]
CVE-2022-3650: ceph-crash: fix stderr handling

Bug: a77b47eeeb5770eeefcf4619ab2105ee7a6a003e
Signed-off-by: Tim Serong <tserong@suse.com>
Bug-Debian: https://bugs.debian.org/1024932
Origin: upstream, https://github.com/ceph/ceph/commit/45915540559126a652f8d9d105723584cfc63439
Last-Update: 2022-11-28

Popen.communicate() returns a tuple (stdout, stderr), and stderr
will be of type bytes, hence the need to decode it before checking
if it's an empty string or not.

Gbp-Pq: Name CVE-2022-3650_2_ceph-crash_fix_stderr_handling.patch

7 weeks agoCVE-2022-3650: ceph-crash: drop privleges to run as "ceph" user, rather than root
Tim Serong [Wed, 2 Nov 2022 03:27:47 +0000 (14:27 +1100)]
CVE-2022-3650: ceph-crash: drop privleges to run as "ceph" user, rather than root

Bug: https://tracker.ceph.com/issues/57967
Signed-off-by: Tim Serong <tserong@suse.com>
Origin: upstream, https://github.com/ceph/ceph/commit/130c9626598bc3a75942161e6cce7c664c447382
Bug-Debian: https://bugs.debian.org/1024932
Last-Update: 2022-11-28

If privileges cannot be dropped, log an error and exit.  This commit
also catches and logs exceptions when scraping the crash path, without
which ceph-crash would just exit if it encountered an error.

Gbp-Pq: Name CVE-2022-3650_1_ceph-crash_drop_privleges_to_run_as_ceph_user_rather_than_root.patch

7 weeks agoallow BGP-to-the-host style binding
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
allow BGP-to-the-host style binding

Forwarded: no
Last-Update: 2021-04-21

Gbp-Pq: Name allow-bgp-to-host.patch

7 weeks agoFix systemd ceph-osd.target
Thomas Goirand [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Fix systemd ceph-osd.target

Forwarded: no
Last-Update: 2021-01-28

This helps when rebooting.

Gbp-Pq: Name fix-ceph-osd-systemd-target.patch

7 weeks agoAnother cmakelists fix
Thomas Goirand [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Another cmakelists fix

Forwarded: no
Last-Update: 2021-01-08

This fixes the last Boost 1.74 compatibility problems.

Gbp-Pq: Name another-cmakelists-fix.patch

7 weeks agocmake: add 1.74 to known versions
Kefu Chai [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
cmake: add 1.74 to known versions

Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13

Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch

7 weeks agocmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Kefu Chai [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for

Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24

Boost.Asio users

see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor

we could use `asio::any_io_executor` later on though for better
performance.

also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").

Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch

7 weeks agoMake Ceph Python 3.9 aware
Thomas Goirand [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Make Ceph Python 3.9 aware

Forwarded: no
Last-Update: 2020-11-28

Add versions of interpreters Ceph didn't know about.

Gbp-Pq: Name make-ceph-python-3.9-aware.patch

7 weeks agomds-purgequeue-use_uint64_t
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
mds-purgequeue-use_uint64_t

===================================================================

Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch

7 weeks agoLink with -pthread instead of -lpthread to fix FTBFS on riscv64
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64

Forwarded: no
Last-Update: 2020-03-01

Gbp-Pq: Name riscv64-link-pthread.patch

7 weeks agoadd-option-to-disable-ceph-dencoder
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
add-option-to-disable-ceph-dencoder

===================================================================

Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch

7 weeks agofix-bash-completion-location
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
fix-bash-completion-location

Gbp-Pq: Name fix-bash-completion-location

7 weeks agodebian-armel-armhf-buildflags
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
debian-armel-armhf-buildflags

Gbp-Pq: Name debian-armel-armhf-buildflags.patch

7 weeks ago[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`

change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.

i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.

Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch

7 weeks agoAdds max_connections to test display.
Jesse Williamson [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Adds max_connections to test display.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch

7 weeks agoMakes SOMAXCONN user-configurable.
Jesse Williamson [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Makes SOMAXCONN user-configurable.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch

7 weeks agoAdds max_connections to reference configuration.
Jesse Williamson [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Adds max_connections to reference configuration.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch

7 weeks agoAvoid use of size_t when necessary
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Avoid use of size_t when necessary

Forwarded: no

On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.

Gbp-Pq: Name 32bit-avoid-size_t.patch

7 weeks agoAvoid overloading on 32 bit architectures
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Avoid overloading on 32 bit architectures

Forwarded: no

unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo

Gbp-Pq: Name 32bit-avoid-overloading.patch

7 weeks agodisable-crypto
Ceph Packaging Team [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
disable-crypto

===================================================================

Gbp-Pq: Name disable-crypto.patch

7 weeks agouse --release 7 instead of -source/-target
Tiago Stürmer Daitx [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
use --release 7 instead of -source/-target

Bug-Ubuntu: https://launchpad.net/bugs/1756854
Bug-Ubuntu: https://launchpad.net/bugs/1766998
Forwarded: no
Last-Update: 2018-04-24

Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch

7 weeks agoceph (14.2.21-1+deb11u2) bullseye-security; urgency=high
Utkarsh Gupta [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
ceph (14.2.21-1+deb11u2) bullseye-security; urgency=high

  * Non-maintainer upload by the LTS team.
  * Add patch to check if HTTP_X_AMZ_COPY_SOURCE header is empty.
    (Fixes: CVE-2024-47866) (Closes: #1120797)
  * Add patch to fix subvolume discover during upgrade.
    (Fixes: CVE-2022-0670) (Closes: #1016069)

[dgit import unpatched ceph 14.2.21-1+deb11u2]

7 weeks agoImport ceph_14.2.21-1+deb11u2.debian.tar.xz
Utkarsh Gupta [Mon, 15 Dec 2025 12:18:10 +0000 (17:48 +0530)]
Import ceph_14.2.21-1+deb11u2.debian.tar.xz

[dgit import tarball ceph 14.2.21-1+deb11u2 ceph_14.2.21-1+deb11u2.debian.tar.xz]

4 months agoMerge ceph (14.2.21-1+deb11u1) import into refs/heads/workingbranch
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Merge ceph (14.2.21-1+deb11u1) import into refs/heads/workingbranch

4 months ago[PATCH] client: prohibit unprivileged users from setting sgid/suid bits
Kefu Chai [Sat, 5 Jul 2025 08:23:36 +0000 (16:23 +0800)]
[PATCH] client: prohibit unprivileged users from setting sgid/suid  bits

Prior to fb1b72d, unprivileged users could add mode bits as long as
S_ISUID and S_ISGID were not included in the change.

After fb1b72d, unprivileged users were allowed to modify S_ISUID and
S_ISGID bits only when no other mode bits were changed in the same
operation. This inadvertently permitted unprivileged users to set
S_ISUID and/or S_ISGID bits when they were the sole bits being modified.

This behavior should not be allowed. Unprivileged users should be
prohibited from setting S_ISUID and/or S_ISGID bits under any
circumstances.

This change tightens the permission check to prevent unprivileged
users from setting these privileged bits in all cases.

Signed-off-by: Kefu Chai <tchaikov@gmail.com>
origin: backport, https://github.com/ceph/ceph/commit/7028ed21138522495df1e9f8b01195a3c43d47ff
bug-debian: https://bugs.debian.org/1109470
bug: https://github.com/ceph/ceph/pull/64356

Gbp-Pq: Name CVE-2025-52555-2.patch

4 months ago[PATCH] client: disallow unprivileged users to escalate root privileges
Xiubo Li [Wed, 3 Apr 2024 11:02:08 +0000 (19:02 +0800)]
[PATCH] client: disallow unprivileged users to escalate root  privileges

An unprivileged user can `chmod 777` a directory owned by root
and gain access. Fix this bug and also add a test case for the
same.

Signed-off-by: Xiubo Li <xiubli@redhat.com>
Signed-off-by: Venky Shankar <vshankar@redhat.com>
origin: backport, https://github.com/ceph/ceph/commit/b6d85b595ea7c9e0fca10d5e77a48102110fe22c
bug-github-pull: https://github.com/ceph/ceph/pull/60314
bug: https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm
bug-debian: https://bugs.debian.org/1108410

Gbp-Pq: Name CVE-2025-52555-1.patch

4 months agoCVE-2023-43040 rgw: Fix bucket validation against POST policies
Joshua Baergen [Wed, 17 May 2023 18:17:09 +0000 (12:17 -0600)]
CVE-2023-43040 rgw: Fix bucket validation against POST policies

It's possible that user could provide a form part as a part of a POST
object upload that uses 'bucket' as a key; in this case, it was
overriding what was being set in the validation env (which is the real
bucket being modified). The result of this is that a user could actually
upload to any bucket accessible by the specified access key by matching
the bucket in the POST policy in said POST form part.

Fix this simply by setting the bucket to the correct value after the
POST form parts are processed, ignoring the form part above if
specified.

bug: https://tracker.ceph.com/issues/63004
bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690
bug-debian-security: https://deb.freexian.com/extended-lts/tracker/CVE-2023-43040

Signed-off-by: Joshua Baergen <jbaergen@digitalocean.com>
origin: backport, https://github.com/ceph/ceph/commit/479976538fe8f51edfea597443ba0c0209d3f39f

Gbp-Pq: Name CVE-2023-43040.patch

4 months agoceph-volume: honour osd_dmcrypt_key_size option
Guillaume Abrioux [Tue, 25 Jan 2022 09:25:53 +0000 (10:25 +0100)]
ceph-volume: honour osd_dmcrypt_key_size option

ceph-volume doesn't honour osd_dmcrypt_key_size.
It means the default size is always applied.

It also changes the default value in `get_key_size_from_conf()`

From cryptsetup manpage:

> For XTS mode you can optionally set a key size of 512 bits with the -s option.

Using more than 512bits will end up with the following error message:

```
Key size in XTS mode must be 256 or 512 bits.
```

Fixes: https://tracker.ceph.com/issues/54006
Signed-off-by: Guillaume Abrioux <gabrioux@redhat.com>
(cherry picked from commit 47c33179f9a15ae95cc1579a421be89378602656)

origin: https://github.com/ceph/ceph/commit/f69339e00f582ec64b843ff58b66817975fca0d7
bug: https://tracker.ceph.com/issues/54006

Gbp-Pq: Name CVE-2021-3979.patch

4 months agoCVE-2022-3650: ceph-crash: fix stderr handling
Tim Serong [Wed, 2 Nov 2022 03:23:20 +0000 (14:23 +1100)]
CVE-2022-3650: ceph-crash: fix stderr handling

Bug: a77b47eeeb5770eeefcf4619ab2105ee7a6a003e
Signed-off-by: Tim Serong <tserong@suse.com>
Bug-Debian: https://bugs.debian.org/1024932
Origin: upstream, https://github.com/ceph/ceph/commit/45915540559126a652f8d9d105723584cfc63439
Last-Update: 2022-11-28

Popen.communicate() returns a tuple (stdout, stderr), and stderr
will be of type bytes, hence the need to decode it before checking
if it's an empty string or not.

Gbp-Pq: Name CVE-2022-3650_2_ceph-crash_fix_stderr_handling.patch

4 months agoCVE-2022-3650: ceph-crash: drop privleges to run as "ceph" user, rather than root
Tim Serong [Wed, 2 Nov 2022 03:27:47 +0000 (14:27 +1100)]
CVE-2022-3650: ceph-crash: drop privleges to run as "ceph" user, rather than root

Bug: https://tracker.ceph.com/issues/57967
Signed-off-by: Tim Serong <tserong@suse.com>
Origin: upstream, https://github.com/ceph/ceph/commit/130c9626598bc3a75942161e6cce7c664c447382
Bug-Debian: https://bugs.debian.org/1024932
Last-Update: 2022-11-28

If privileges cannot be dropped, log an error and exit.  This commit
also catches and logs exceptions when scraping the crash path, without
which ceph-crash would just exit if it encountered an error.

Gbp-Pq: Name CVE-2022-3650_1_ceph-crash_drop_privleges_to_run_as_ceph_user_rather_than_root.patch

4 months agoallow BGP-to-the-host style binding
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
allow BGP-to-the-host style binding

Forwarded: no
Last-Update: 2021-04-21

Gbp-Pq: Name allow-bgp-to-host.patch

4 months agoFix systemd ceph-osd.target
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Fix systemd ceph-osd.target

Forwarded: no
Last-Update: 2021-01-28

This helps when rebooting.

Gbp-Pq: Name fix-ceph-osd-systemd-target.patch

4 months agoAnother cmakelists fix
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Another cmakelists fix

Forwarded: no
Last-Update: 2021-01-08

This fixes the last Boost 1.74 compatibility problems.

Gbp-Pq: Name another-cmakelists-fix.patch

4 months agocmake: add 1.74 to known versions
Kefu Chai [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
cmake: add 1.74 to known versions

Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13

Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch

4 months agocmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Kefu Chai [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for

Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24

Boost.Asio users

see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor

we could use `asio::any_io_executor` later on though for better
performance.

also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").

Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch

4 months agoMake Ceph Python 3.9 aware
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Make Ceph Python 3.9 aware

Forwarded: no
Last-Update: 2020-11-28

Add versions of interpreters Ceph didn't know about.

Gbp-Pq: Name make-ceph-python-3.9-aware.patch

4 months agomds-purgequeue-use_uint64_t
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
mds-purgequeue-use_uint64_t

===================================================================

Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch

4 months agoLink with -pthread instead of -lpthread to fix FTBFS on riscv64
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64

Forwarded: no
Last-Update: 2020-03-01

Gbp-Pq: Name riscv64-link-pthread.patch

4 months agoadd-option-to-disable-ceph-dencoder
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
add-option-to-disable-ceph-dencoder

===================================================================

Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch

4 months agofix-bash-completion-location
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
fix-bash-completion-location

Gbp-Pq: Name fix-bash-completion-location

4 months agodebian-armel-armhf-buildflags
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
debian-armel-armhf-buildflags

Gbp-Pq: Name debian-armel-armhf-buildflags.patch

4 months ago[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`

change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.

i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.

Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch

4 months agoAdds max_connections to test display.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to test display.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch

4 months agoMakes SOMAXCONN user-configurable.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Makes SOMAXCONN user-configurable.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch

4 months agoAdds max_connections to reference configuration.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to reference configuration.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch

4 months agoAvoid use of size_t when necessary
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid use of size_t when necessary

Forwarded: no

On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.

Gbp-Pq: Name 32bit-avoid-size_t.patch

4 months agoAvoid overloading on 32 bit architectures
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid overloading on 32 bit architectures

Forwarded: no

unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo

Gbp-Pq: Name 32bit-avoid-overloading.patch

4 months agodisable-crypto
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
disable-crypto

===================================================================

Gbp-Pq: Name disable-crypto.patch

4 months agouse --release 7 instead of -source/-target
Tiago Stürmer Daitx [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
use --release 7 instead of -source/-target

Bug-Ubuntu: https://launchpad.net/bugs/1756854
Bug-Ubuntu: https://launchpad.net/bugs/1766998
Forwarded: no
Last-Update: 2018-04-24

Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch

4 months agoceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
ceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium

  [ Thomas Goirand ]

  * CVE-2022-3650: privilege escalation from the ceph user to root. Applied
    upstream patches (Closes: #1024932).

  [ Bastien Roucariès ]
  * CVE-2021-3979:
    A key length flaw was found. An attacker can exploit the
    fact that the key length is incorrectly passed in an
    encryption algorithm to create a non random key,
    which is weaker and can be exploited for loss of
    confidentiality and integrity on encrypted disks.
  * CVE-2023-43040 rgw: Fix bucket validation against POST policies
    (Closes: #1053690)
  * CVE-2025-52555: an unprivileged user can escalate to root
    privileges in a ceph-fuse mounted CephFS by chmod 777
    a directory owned by root to gain access. The result
    of this is that a user could read, write and execute
    to any directory owned by root as long as they chmod
    777 it. This impacts confidentiality, integrity, and availability.
    (Closes: #1108410)

[dgit import unpatched ceph 14.2.21-1+deb11u1]

4 months agoImport ceph_14.2.21-1+deb11u1.debian.tar.xz
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Import ceph_14.2.21-1+deb11u1.debian.tar.xz

[dgit import tarball ceph 14.2.21-1+deb11u1 ceph_14.2.21-1+deb11u1.debian.tar.xz]

4 years agoMerge version 14.2.20-2+rpi1 and 14.2.21-1 to produce 14.2.21-1+rpi1 archive/raspbian/14.2.21-1+rpi1 raspbian/14.2.21-1+rpi1
Raspbian automatic forward porter [Fri, 4 Jun 2021 01:22:26 +0000 (02:22 +0100)]
Merge version 14.2.20-2+rpi1 and 14.2.21-1 to produce 14.2.21-1+rpi1

4 years agoImport ceph_14.2.21.orig.tar.gz
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (12:04 +0200)]
Import ceph_14.2.21.orig.tar.gz

[dgit import orig ceph_14.2.21.orig.tar.gz]

4 years agoMerge ceph (14.2.21-1) import into refs/heads/workingbranch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Merge ceph (14.2.21-1) import into refs/heads/workingbranch

4 years agoallow BGP-to-the-host style binding
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
allow BGP-to-the-host style binding

Forwarded: no
Last-Update: 2021-04-21

Gbp-Pq: Name allow-bgp-to-host.patch

4 years agoFix systemd ceph-osd.target
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Fix systemd ceph-osd.target

Forwarded: no
Last-Update: 2021-01-28

This helps when rebooting.

Gbp-Pq: Name fix-ceph-osd-systemd-target.patch

4 years agoAnother cmakelists fix
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Another cmakelists fix

Forwarded: no
Last-Update: 2021-01-08

This fixes the last Boost 1.74 compatibility problems.

Gbp-Pq: Name another-cmakelists-fix.patch

4 years agocmake: add 1.74 to known versions
Kefu Chai [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
cmake: add 1.74 to known versions

Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13

Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch

4 years agocmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Kefu Chai [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for

Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24

Boost.Asio users

see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor

we could use `asio::any_io_executor` later on though for better
performance.

also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").

Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch

4 years agoMake Ceph Python 3.9 aware
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Make Ceph Python 3.9 aware

Forwarded: no
Last-Update: 2020-11-28

Add versions of interpreters Ceph didn't know about.

Gbp-Pq: Name make-ceph-python-3.9-aware.patch

4 years agomds-purgequeue-use_uint64_t
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
mds-purgequeue-use_uint64_t

===================================================================

Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch

4 years agoLink with -pthread instead of -lpthread to fix FTBFS on riscv64
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64

Forwarded: no
Last-Update: 2020-03-01

Gbp-Pq: Name riscv64-link-pthread.patch

4 years agoadd-option-to-disable-ceph-dencoder
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
add-option-to-disable-ceph-dencoder

===================================================================

Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch

4 years agofix-bash-completion-location
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
fix-bash-completion-location

Gbp-Pq: Name fix-bash-completion-location

4 years agodebian-armel-armhf-buildflags
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
debian-armel-armhf-buildflags

Gbp-Pq: Name debian-armel-armhf-buildflags.patch

4 years ago[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`

change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.

i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.

Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch

4 years agoAdds max_connections to test display.
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Adds max_connections to test display.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch

4 years agoMakes SOMAXCONN user-configurable.
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Makes SOMAXCONN user-configurable.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch

4 years agoAdds max_connections to reference configuration.
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Adds max_connections to reference configuration.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch

4 years agoAvoid use of size_t when necessary
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Avoid use of size_t when necessary

Forwarded: no

On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.

Gbp-Pq: Name 32bit-avoid-size_t.patch

4 years agoAvoid overloading on 32 bit architectures
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Avoid overloading on 32 bit architectures

Forwarded: no

unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo

Gbp-Pq: Name 32bit-avoid-overloading.patch

4 years agodisable-crypto
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
disable-crypto

===================================================================

Gbp-Pq: Name disable-crypto.patch

4 years agouse --release 7 instead of -source/-target
Tiago Stürmer Daitx [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
use --release 7 instead of -source/-target

Bug-Ubuntu: https://launchpad.net/bugs/1756854
Bug-Ubuntu: https://launchpad.net/bugs/1766998
Forwarded: no
Last-Update: 2018-04-24

Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch

4 years agoceph (14.2.21-1) unstable; urgency=high
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
ceph (14.2.21-1) unstable; urgency=high

  * New upstream release, resolving these:
    - CVE-2021-3509: Cross Site Scripting via token Cookie (Closes: #988888).
    - CVE-2021-3524: injection of HTTP headers via a CORS ExposeHeader tag in
      the Ceph Storage RadosGW (Closes: #988889).
    - CVE-2021-3531: RadosGW denial of service (crash) (Closes: #988890).

[dgit import unpatched ceph 14.2.21-1]

4 years agoImport ceph_14.2.21.orig.tar.gz
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Import ceph_14.2.21.orig.tar.gz

[dgit import orig ceph_14.2.21.orig.tar.gz]

4 years agoImport ceph_14.2.21-1.debian.tar.xz
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Import ceph_14.2.21-1.debian.tar.xz

[dgit import tarball ceph 14.2.21-1 ceph_14.2.21-1.debian.tar.xz]

4 years agoMerge version 14.2.16-2+rpi1 and 14.2.20-2 to produce 14.2.20-2+rpi1 archive/raspbian/14.2.20-2+rpi1 raspbian/14.2.20-2+rpi1
Raspbian automatic forward porter [Tue, 11 May 2021 15:04:11 +0000 (16:04 +0100)]
Merge version 14.2.16-2+rpi1 and 14.2.20-2 to produce 14.2.20-2+rpi1

4 years agoMerge ceph (14.2.20-2) import into refs/heads/workingbranch
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Merge ceph (14.2.20-2) import into refs/heads/workingbranch

4 years agoallow BGP-to-the-host style binding
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
allow BGP-to-the-host style binding

Forwarded: no
Last-Update: 2021-04-21

Gbp-Pq: Name allow-bgp-to-host.patch

4 years agoFix systemd ceph-osd.target
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Fix systemd ceph-osd.target

Forwarded: no
Last-Update: 2021-01-28

This helps when rebooting.

Gbp-Pq: Name fix-ceph-osd-systemd-target.patch

4 years agoAnother cmakelists fix
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Another cmakelists fix

Forwarded: no
Last-Update: 2021-01-08

This fixes the last Boost 1.74 compatibility problems.

Gbp-Pq: Name another-cmakelists-fix.patch

4 years agocmake: add 1.74 to known versions
Kefu Chai [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
cmake: add 1.74 to known versions

Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13

Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch

4 years agocmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Kefu Chai [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for

Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24

Boost.Asio users

see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor

we could use `asio::any_io_executor` later on though for better
performance.

also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").

Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch

4 years agoMake Ceph Python 3.9 aware
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Make Ceph Python 3.9 aware

Forwarded: no
Last-Update: 2020-11-28

Add versions of interpreters Ceph didn't know about.

Gbp-Pq: Name make-ceph-python-3.9-aware.patch

4 years agomds-purgequeue-use_uint64_t
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
mds-purgequeue-use_uint64_t

===================================================================

Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch

4 years agoLink with -pthread instead of -lpthread to fix FTBFS on riscv64
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64

Forwarded: no
Last-Update: 2020-03-01

Gbp-Pq: Name riscv64-link-pthread.patch

4 years agoadd-option-to-disable-ceph-dencoder
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
add-option-to-disable-ceph-dencoder

===================================================================

Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch

4 years agofix-bash-completion-location
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
fix-bash-completion-location

Gbp-Pq: Name fix-bash-completion-location

4 years agodebian-armel-armhf-buildflags
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
debian-armel-armhf-buildflags

Gbp-Pq: Name debian-armel-armhf-buildflags.patch

4 years ago[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`

change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.

i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.

Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch

4 years agoAdds max_connections to test display.
Jesse Williamson [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Adds max_connections to test display.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch

4 years agoMakes SOMAXCONN user-configurable.
Jesse Williamson [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Makes SOMAXCONN user-configurable.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch