Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Merge ceph (14.2.21-1+deb11u1) import into refs/heads/workingbranch
Kefu Chai [Sat, 5 Jul 2025 08:23:36 +0000 (16:23 +0800)]
[PATCH] client: prohibit unprivileged users from setting sgid/suid bits
Prior to
fb1b72d, unprivileged users could add mode bits as long as
S_ISUID and S_ISGID were not included in the change.
After
fb1b72d, unprivileged users were allowed to modify S_ISUID and
S_ISGID bits only when no other mode bits were changed in the same
operation. This inadvertently permitted unprivileged users to set
S_ISUID and/or S_ISGID bits when they were the sole bits being modified.
This behavior should not be allowed. Unprivileged users should be
prohibited from setting S_ISUID and/or S_ISGID bits under any
circumstances.
This change tightens the permission check to prevent unprivileged
users from setting these privileged bits in all cases.
Signed-off-by: Kefu Chai <tchaikov@gmail.com>
origin: backport, https://github.com/ceph/ceph/commit/
7028ed21138522495df1e9f8b01195a3c43d47ff
bug-debian: https://bugs.debian.org/
1109470
bug: https://github.com/ceph/ceph/pull/64356
Gbp-Pq: Name CVE-2025-52555-2.patch
Xiubo Li [Wed, 3 Apr 2024 11:02:08 +0000 (19:02 +0800)]
[PATCH] client: disallow unprivileged users to escalate root privileges
An unprivileged user can `chmod 777` a directory owned by root
and gain access. Fix this bug and also add a test case for the
same.
Signed-off-by: Xiubo Li <xiubli@redhat.com>
Signed-off-by: Venky Shankar <vshankar@redhat.com>
origin: backport, https://github.com/ceph/ceph/commit/
b6d85b595ea7c9e0fca10d5e77a48102110fe22c
bug-github-pull: https://github.com/ceph/ceph/pull/60314
bug: https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm
bug-debian: https://bugs.debian.org/
1108410
Gbp-Pq: Name CVE-2025-52555-1.patch
Joshua Baergen [Wed, 17 May 2023 18:17:09 +0000 (12:17 -0600)]
CVE-2023-43040 rgw: Fix bucket validation against POST policies
It's possible that user could provide a form part as a part of a POST
object upload that uses 'bucket' as a key; in this case, it was
overriding what was being set in the validation env (which is the real
bucket being modified). The result of this is that a user could actually
upload to any bucket accessible by the specified access key by matching
the bucket in the POST policy in said POST form part.
Fix this simply by setting the bucket to the correct value after the
POST form parts are processed, ignoring the form part above if
specified.
bug: https://tracker.ceph.com/issues/63004
bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=
1053690
bug-debian-security: https://deb.freexian.com/extended-lts/tracker/CVE-2023-43040
Signed-off-by: Joshua Baergen <jbaergen@digitalocean.com>
origin: backport, https://github.com/ceph/ceph/commit/
479976538fe8f51edfea597443ba0c0209d3f39f
Gbp-Pq: Name CVE-2023-43040.patch
Guillaume Abrioux [Tue, 25 Jan 2022 09:25:53 +0000 (10:25 +0100)]
ceph-volume: honour osd_dmcrypt_key_size option
ceph-volume doesn't honour osd_dmcrypt_key_size.
It means the default size is always applied.
It also changes the default value in `get_key_size_from_conf()`
From cryptsetup manpage:
> For XTS mode you can optionally set a key size of 512 bits with the -s option.
Using more than 512bits will end up with the following error message:
```
Key size in XTS mode must be 256 or 512 bits.
```
Fixes: https://tracker.ceph.com/issues/54006
Signed-off-by: Guillaume Abrioux <gabrioux@redhat.com>
(cherry picked from commit
47c33179f9a15ae95cc1579a421be89378602656)
origin: https://github.com/ceph/ceph/commit/
f69339e00f582ec64b843ff58b66817975fca0d7
bug: https://tracker.ceph.com/issues/54006
Gbp-Pq: Name CVE-2021-3979.patch
Tim Serong [Wed, 2 Nov 2022 03:23:20 +0000 (14:23 +1100)]
CVE-2022-3650: ceph-crash: fix stderr handling
Bug:
a77b47eeeb5770eeefcf4619ab2105ee7a6a003e
Signed-off-by: Tim Serong <tserong@suse.com>
Bug-Debian: https://bugs.debian.org/
1024932
Origin: upstream, https://github.com/ceph/ceph/commit/
45915540559126a652f8d9d105723584cfc63439
Last-Update: 2022-11-28
Popen.communicate() returns a tuple (stdout, stderr), and stderr
will be of type bytes, hence the need to decode it before checking
if it's an empty string or not.
Gbp-Pq: Name CVE-2022-3650_2_ceph-crash_fix_stderr_handling.patch
Tim Serong [Wed, 2 Nov 2022 03:27:47 +0000 (14:27 +1100)]
CVE-2022-3650: ceph-crash: drop privleges to run as "ceph" user, rather than root
Bug: https://tracker.ceph.com/issues/57967
Signed-off-by: Tim Serong <tserong@suse.com>
Origin: upstream, https://github.com/ceph/ceph/commit/
130c9626598bc3a75942161e6cce7c664c447382
Bug-Debian: https://bugs.debian.org/
1024932
Last-Update: 2022-11-28
If privileges cannot be dropped, log an error and exit. This commit
also catches and logs exceptions when scraping the crash path, without
which ceph-crash would just exit if it encountered an error.
Gbp-Pq: Name CVE-2022-3650_1_ceph-crash_drop_privleges_to_run_as_ceph_user_rather_than_root.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
allow BGP-to-the-host style binding
Forwarded: no
Last-Update: 2021-04-21
Gbp-Pq: Name allow-bgp-to-host.patch
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Fix systemd ceph-osd.target
Forwarded: no
Last-Update: 2021-01-28
This helps when rebooting.
Gbp-Pq: Name fix-ceph-osd-systemd-target.patch
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Another cmakelists fix
Forwarded: no
Last-Update: 2021-01-08
This fixes the last Boost 1.74 compatibility problems.
Gbp-Pq: Name another-cmakelists-fix.patch
Kefu Chai [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
cmake: add 1.74 to known versions
Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/
b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13
Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch
Kefu Chai [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/
3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24
Boost.Asio users
see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor
we could use `asio::any_io_executor` later on though for better
performance.
also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").
Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch
Thomas Goirand [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Make Ceph Python 3.9 aware
Forwarded: no
Last-Update: 2020-11-28
Add versions of interpreters Ceph didn't know about.
Gbp-Pq: Name make-ceph-python-3.9-aware.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
mds-purgequeue-use_uint64_t
===================================================================
Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64
Forwarded: no
Last-Update: 2020-03-01
Gbp-Pq: Name riscv64-link-pthread.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
add-option-to-disable-ceph-dencoder
===================================================================
Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
fix-bash-completion-location
Gbp-Pq: Name fix-bash-completion-location
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
debian-armel-armhf-buildflags
Gbp-Pq: Name debian-armel-armhf-buildflags.patch
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.
i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.
Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to test display.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Makes SOMAXCONN user-configurable.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to reference configuration.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid use of size_t when necessary
Forwarded: no
On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.
Gbp-Pq: Name 32bit-avoid-size_t.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid overloading on 32 bit architectures
Forwarded: no
unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo
Gbp-Pq: Name 32bit-avoid-overloading.patch
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
disable-crypto
===================================================================
Gbp-Pq: Name disable-crypto.patch
Tiago Stürmer Daitx [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
use --release 7 instead of -source/-target
Bug-Ubuntu: https://launchpad.net/bugs/
1756854
Bug-Ubuntu: https://launchpad.net/bugs/
1766998
Forwarded: no
Last-Update: 2018-04-24
Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
ceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium
[ Thomas Goirand ]
* CVE-2022-3650: privilege escalation from the ceph user to root. Applied
upstream patches (Closes: #
1024932).
[ Bastien Roucariès ]
* CVE-2021-3979:
A key length flaw was found. An attacker can exploit the
fact that the key length is incorrectly passed in an
encryption algorithm to create a non random key,
which is weaker and can be exploited for loss of
confidentiality and integrity on encrypted disks.
* CVE-2023-43040 rgw: Fix bucket validation against POST policies
(Closes: #
1053690)
* CVE-2025-52555: an unprivileged user can escalate to root
privileges in a ceph-fuse mounted CephFS by chmod 777
a directory owned by root to gain access. The result
of this is that a user could read, write and execute
to any directory owned by root as long as they chmod
777 it. This impacts confidentiality, integrity, and availability.
(Closes: #
1108410)
[dgit import unpatched ceph 14.2.21-1+deb11u1]
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Import ceph_14.2.21-1+deb11u1.debian.tar.xz
[dgit import tarball ceph 14.2.21-1+deb11u1 ceph_14.2.21-1+deb11u1.debian.tar.xz]
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Merge ceph (14.2.21-1) import into refs/heads/workingbranch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (12:04 +0200)]
Import ceph_14.2.21.orig.tar.gz
[dgit import orig ceph_14.2.21.orig.tar.gz]
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
allow BGP-to-the-host style binding
Forwarded: no
Last-Update: 2021-04-21
Gbp-Pq: Name allow-bgp-to-host.patch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Fix systemd ceph-osd.target
Forwarded: no
Last-Update: 2021-01-28
This helps when rebooting.
Gbp-Pq: Name fix-ceph-osd-systemd-target.patch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Another cmakelists fix
Forwarded: no
Last-Update: 2021-01-08
This fixes the last Boost 1.74 compatibility problems.
Gbp-Pq: Name another-cmakelists-fix.patch
Kefu Chai [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
cmake: add 1.74 to known versions
Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/
b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13
Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch
Kefu Chai [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/
3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24
Boost.Asio users
see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor
we could use `asio::any_io_executor` later on though for better
performance.
also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").
Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Make Ceph Python 3.9 aware
Forwarded: no
Last-Update: 2020-11-28
Add versions of interpreters Ceph didn't know about.
Gbp-Pq: Name make-ceph-python-3.9-aware.patch
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
mds-purgequeue-use_uint64_t
===================================================================
Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64
Forwarded: no
Last-Update: 2020-03-01
Gbp-Pq: Name riscv64-link-pthread.patch
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
add-option-to-disable-ceph-dencoder
===================================================================
Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
fix-bash-completion-location
Gbp-Pq: Name fix-bash-completion-location
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
debian-armel-armhf-buildflags
Gbp-Pq: Name debian-armel-armhf-buildflags.patch
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.
i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.
Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Adds max_connections to test display.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Makes SOMAXCONN user-configurable.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch
Jesse Williamson [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Adds max_connections to reference configuration.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Avoid use of size_t when necessary
Forwarded: no
On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.
Gbp-Pq: Name 32bit-avoid-size_t.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Avoid overloading on 32 bit architectures
Forwarded: no
unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo
Gbp-Pq: Name 32bit-avoid-overloading.patch
Ceph Packaging Team [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
disable-crypto
===================================================================
Gbp-Pq: Name disable-crypto.patch
Tiago Stürmer Daitx [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
use --release 7 instead of -source/-target
Bug-Ubuntu: https://launchpad.net/bugs/
1756854
Bug-Ubuntu: https://launchpad.net/bugs/
1766998
Forwarded: no
Last-Update: 2018-04-24
Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
ceph (14.2.21-1) unstable; urgency=high
* New upstream release, resolving these:
- CVE-2021-3509: Cross Site Scripting via token Cookie (Closes: #988888).
- CVE-2021-3524: injection of HTTP headers via a CORS ExposeHeader tag in
the Ceph Storage RadosGW (Closes: #988889).
- CVE-2021-3531: RadosGW denial of service (crash) (Closes: #988890).
[dgit import unpatched ceph 14.2.21-1]
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Import ceph_14.2.21.orig.tar.gz
[dgit import orig ceph_14.2.21.orig.tar.gz]
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (11:04 +0100)]
Import ceph_14.2.21-1.debian.tar.xz
[dgit import tarball ceph 14.2.21-1 ceph_14.2.21-1.debian.tar.xz]
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Merge ceph (14.2.20-2) import into refs/heads/workingbranch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
allow BGP-to-the-host style binding
Forwarded: no
Last-Update: 2021-04-21
Gbp-Pq: Name allow-bgp-to-host.patch
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Fix systemd ceph-osd.target
Forwarded: no
Last-Update: 2021-01-28
This helps when rebooting.
Gbp-Pq: Name fix-ceph-osd-systemd-target.patch
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Another cmakelists fix
Forwarded: no
Last-Update: 2021-01-08
This fixes the last Boost 1.74 compatibility problems.
Gbp-Pq: Name another-cmakelists-fix.patch
Kefu Chai [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
cmake: add 1.74 to known versions
Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/
b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13
Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch
Kefu Chai [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/
3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2021-03-24
Boost.Asio users
see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor
we could use `asio::any_io_executor` later on though for better
performance.
also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").
Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Make Ceph Python 3.9 aware
Forwarded: no
Last-Update: 2020-11-28
Add versions of interpreters Ceph didn't know about.
Gbp-Pq: Name make-ceph-python-3.9-aware.patch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
mds-purgequeue-use_uint64_t
===================================================================
Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64
Forwarded: no
Last-Update: 2020-03-01
Gbp-Pq: Name riscv64-link-pthread.patch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
add-option-to-disable-ceph-dencoder
===================================================================
Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
fix-bash-completion-location
Gbp-Pq: Name fix-bash-completion-location
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
debian-armel-armhf-buildflags
Gbp-Pq: Name debian-armel-armhf-buildflags.patch
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.
i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.
Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch
Jesse Williamson [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Adds max_connections to test display.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch
Jesse Williamson [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Makes SOMAXCONN user-configurable.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch
Jesse Williamson [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Adds max_connections to reference configuration.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Avoid use of size_t when necessary
Forwarded: no
On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.
Gbp-Pq: Name 32bit-avoid-size_t.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Avoid overloading on 32 bit architectures
Forwarded: no
unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo
Gbp-Pq: Name 32bit-avoid-overloading.patch
Ceph Packaging Team [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
disable-crypto
===================================================================
Gbp-Pq: Name disable-crypto.patch
Tiago Stürmer Daitx [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
use --release 7 instead of -source/-target
Bug-Ubuntu: https://launchpad.net/bugs/
1756854
Bug-Ubuntu: https://launchpad.net/bugs/
1766998
Forwarded: no
Last-Update: 2018-04-24
Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
ceph (14.2.20-2) unstable; urgency=medium
* Add allow-bgp-to-host.patch.
[dgit import unpatched ceph 14.2.20-2]
Thomas Goirand [Wed, 21 Apr 2021 08:02:07 +0000 (09:02 +0100)]
Import ceph_14.2.20-2.debian.tar.xz
[dgit import tarball ceph 14.2.20-2 ceph_14.2.20-2.debian.tar.xz]
Thomas Goirand [Tue, 20 Apr 2021 11:00:13 +0000 (12:00 +0100)]
Import ceph_14.2.20.orig.tar.gz
[dgit import orig ceph_14.2.20.orig.tar.gz]
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Merge ceph (14.2.16-2) import into refs/heads/workingbranch
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Fix systemd ceph-osd.target
Forwarded: no
Last-Update: 2021-01-28
This helps when rebooting.
Gbp-Pq: Name fix-ceph-osd-systemd-target.patch
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Allow binding on lo
Forwarded: https://github.com/ceph/ceph/pull/38925
Last-Update: 2021-01-15
Commmit
5cf0fa8, solves the issue that
the osd can't restart after seting a virtual local loopback IP. However,
this commit also prevents a bgp-to-the-host over unumbered Ipv6
local-link is setup, where OSD typically are bound to the lo interface.
To solve this, this single char patch simply checks against "lo:" to
match only virtual interfaces instead of anything that starts with "lo".
Gbp-Pq: Name allow-binding-on-lo.patch
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Another cmakelists fix
Forwarded: no
Last-Update: 2021-01-08
This fixes the last Boost 1.74 compatibility problems.
Gbp-Pq: Name another-cmakelists-fix.patch
Kefu Chai [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
cmake: add 1.74 to known versions
Bug-Debian: https://bugs.debian.org/977243
Origin: upstream, https://github.com/ceph/ceph/commit/
b6a94da6149e50bdd43752919d7c01b04c59f79e.patch
Last-Update: 2020-12-13
Gbp-Pq: Name cmake_add_1.74_to_known_versions.patch
Kefu Chai [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
cmake: define BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT for
Signed-off-by: Kefu Chai <kchai@redhat.com>
Origin: upstream, https://github.com/ceph/ceph/commit/
3d708219092d0e89a1434c30ffc8a4999f062cc0.patch
Bug-Debian: https://bugs.debian.org/977243
Last-Update: 2020-12-13
Boost.Asio users
see also
https://www.boost.org/doc/libs/1_74_0/doc/html/boost_asio/std_executors.html#boost_asio.std_executors.polymorphic_i_o_executor
we could use `asio::any_io_executor` later on though for better
performance.
also, define CMP0093, so FindBoost reports Boost_VERSION in x.y.z
format. it is simpler to use `VERSION_GREATER_EQUAL` to compare its
version with 1.74 instead of its C macro version ("107000").
Gbp-Pq: Name cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Make Ceph Python 3.9 aware
Forwarded: no
Last-Update: 2020-11-28
Add versions of interpreters Ceph didn't know about.
Gbp-Pq: Name make-ceph-python-3.9-aware.patch
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
mds-purgequeue-use_uint64_t
===================================================================
Gbp-Pq: Name mds-purgequeue-use_uint64_t.patch
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Link with -pthread instead of -lpthread to fix FTBFS on riscv64
Forwarded: no
Last-Update: 2020-03-01
Gbp-Pq: Name riscv64-link-pthread.patch
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
add-option-to-disable-ceph-dencoder
===================================================================
Gbp-Pq: Name add-option-to-disable-ceph-dencoder.patch
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
fix-bash-completion-location
Gbp-Pq: Name fix-bash-completion-location
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
debian-armel-armhf-buildflags
Gbp-Pq: Name debian-armel-armhf-buildflags.patch
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.
i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.
Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch
Jesse Williamson [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Adds max_connections to test display.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch
Jesse Williamson [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Makes SOMAXCONN user-configurable.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch
Jesse Williamson [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Adds max_connections to reference configuration.
Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/
3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/
1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Avoid use of size_t when necessary
Forwarded: no
On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.
Gbp-Pq: Name 32bit-avoid-size_t.patch
James Page james.page@ubuntu.com, Bernd Zeimetz [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Avoid overloading on 32 bit architectures
Forwarded: no
unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo
Gbp-Pq: Name 32bit-avoid-overloading.patch
Ceph Packaging Team [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
disable-crypto
===================================================================
Gbp-Pq: Name disable-crypto.patch
Tiago Stürmer Daitx [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
use --release 7 instead of -source/-target
Bug-Ubuntu: https://launchpad.net/bugs/
1756854
Bug-Ubuntu: https://launchpad.net/bugs/
1766998
Forwarded: no
Last-Update: 2018-04-24
Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
ceph (14.2.16-2) unstable; urgency=medium
* Add fix-ceph-osd-systemd-target.patch.
[dgit import unpatched ceph 14.2.16-2]
Thomas Goirand [Thu, 28 Jan 2021 15:45:23 +0000 (15:45 +0000)]
Import ceph_14.2.16-2.debian.tar.xz
[dgit import tarball ceph 14.2.16-2 ceph_14.2.16-2.debian.tar.xz]
Thomas Goirand [Fri, 15 Jan 2021 11:26:14 +0000 (11:26 +0000)]
Merge ceph (14.2.16-1) import into refs/heads/workingbranch
Thomas Goirand [Fri, 15 Jan 2021 11:26:14 +0000 (11:26 +0000)]
Import ceph_14.2.16.orig.tar.gz
[dgit import orig ceph_14.2.16.orig.tar.gz]
Thomas Goirand [Fri, 15 Jan 2021 11:26:14 +0000 (11:26 +0000)]
Allow binding on lo
Forwarded: https://github.com/ceph/ceph/pull/38925
Last-Update: 2021-01-15
Commmit
5cf0fa8, solves the issue that
the osd can't restart after seting a virtual local loopback IP. However,
this commit also prevents a bgp-to-the-host over unumbered Ipv6
local-link is setup, where OSD typically are bound to the lo interface.
To solve this, this single char patch simply checks against "lo:" to
match only virtual interfaces instead of anything that starts with "lo".
Gbp-Pq: Name allow-binding-on-lo.patch