Bug#1061770: ipmitool: unsupported LAN parameter lookup command returns an error

2024-04-29 Thread Miao Wang
control: severity -1 important

> 2024年4月30日 13:37,Miao Wang  写道:
> 
> Hi, all
> 
> The ipmitool repo has been migrated to https://codeberg.org/IPMITool/ipmitool
> and I have fixed this problem in the commit 
> https://codeberg.org/IPMITool/ipmitool/commit/137aeb
> 
> I raised the severity because this bug makes ipmitool lan unusable on several
> different platforms. I also hope maintainers can also backport this fix to the
> current stable version.
> 
> Cheers,
> 
> Miao Wang



Bug#1061770: ipmitool: unsupported LAN parameter lookup command returns an error

2024-04-29 Thread Miao Wang
Hi, all

The ipmitool repo has been migrated to https://codeberg.org/IPMITool/ipmitool
and I have fixed this problem in the commit 
https://codeberg.org/IPMITool/ipmitool/commit/137aeb

I raised the severity because this bug makes ipmitool lan unusable on several
different platforms. I also hope maintainers can also backport this fix to the
current stable version.

Cheers,

Miao Wang


Bug#1068725: libnginx-mod-http-js contains unnecessary dependency

2024-04-09 Thread Miao Wang
Package: libnginx-mod-http-js
Version: 0.8.2-1+b1
Severity: normal

Dear Maintainer,

libnginx-mod-http-js contains a dependency on libnginx-mod-stream, which should 
be only necessary for libnginx-mod-stream-js.

Cheers,

Miao Wang


Bug#1028416: systemctl kexec doesn't shutdown system properly and corrupts mounted filesystems

2024-02-18 Thread Miao Wang
Dear maintainer,

I wonder if this fix can be backported to stable-pu and oldstable-pu,
since this bug may lead to data corruption. A possible approach might
be to mask the kexec init script in the systemd side, i.e. via
`systemctl mask kexec.service`, so that systemd users can get rid of
the kexec init script and other init system users can still enjoy
the provided kexec init script.

Cheers,

Miao Wang



Bug#1055542: cannot build go packages with golang-github-containers-image-dev

2023-11-07 Thread Miao Wang
Package: golang-github-containers-image-dev
Version: 5.28.0-3
Severity: normal

In 5.28.0-3 of golang-github-containers-image-dev, a patch is included to 
revert the upstream change updating x-exp-slices. However the package 
golang-golang-x-exp has been updated to 0.0~git20231006.7918f67-1 in debian 
recently, and as a result this package currently contains a function call which 
does not match the definition in golang-golang-x-exp and thus cannot be built.

I suggest the patch `revert-x-exp-slices.patch` should be accordingly removed.

Cheers,

Miao Wang



Bug#1055285: libseccomp misbehave on loong64

2023-11-03 Thread Miao Wang
Package: libseccomp2
Version: 2.5.4-1+loong64
Severity: normal
Tags: patch

libseccomp2 in debian ports lonng64 cannot work properly because it is using a
wrong mapping between syscall numbers and names, which can be reproduced by
first installing package seccomp and then execute:

```
scmp_sys_resolver accept
```

The syscall number in the output is not correct, which should be 202 on loong64
architecture. 

The root cause of this bug lies in the patch
`add-loongarch64-support-from-libseccomp-upstream.patch` applied in the version
2.5.4-1+loong64: 

```
--- libseccomp-2.5.4.orig/src/syscalls.csv
+++ libseccomp-2.5.4/src/syscalls.csv
@@ -1,4 +1,4 @@
-#syscall (v5.17.0 
2022-04-05),x86,x86_64,x32,arm,aarch64,mips,mips64,mips64n32,parisc,parisc64,ppc,ppc64,riscv64,s390,s390x
+#syscall (v5.17.0 
2022-04-05),x86,x86_64,x32,arm,aarch64,loongarch64,mips,mips64,mips64n32,parisc,parisc64,ppc,ppc64,riscv64,s390,s390x
accept,PNR,43,43,285,202,168,42,42,35,35,330,330,202,PNR,PNR
accept4,364,288,288,366,242,334,293,297,320,320,344,344,242,364,364
access,33,21,21,33,PNR,33,20,20,33,33,33,33,PNR,33,33
```

which only changes the header of the syscall table but fails to include syscall
numbers for loong64 architecture. The result is that on loong64 architecture,
the syscall number mapping for mips is actually in effect. All the mappings for
architectures listed after mips are also wrong. Especially for s390x, when
trying to convert between syscall names and numbers, memory overflow will
happen and the output will be totally garbage.

This issue prevents container manage applications such as Podman from working
correctly on loong64 architecture.

To fix this issue, correct syscall mapping should be introduced. The attached
patch (on top of the original patch) should work. It also includes a fix for
the tests so that the package can be built without nocheck.

Cheers,

Miao Wang

Index: libseccomp-2.5.4/include/seccomp-syscalls.h
===
--- libseccomp-2.5.4.orig/include/seccomp-syscalls.h
+++ libseccomp-2.5.4/include/seccomp-syscalls.h
@@ -276,6 +276,7 @@
 #define __PNR_renameat -10242
 #define __PNR_riscv_flush_icache   -10243
 #define __PNR_memfd_secret -10244
+#define __PNR_fstat-10245
 
 /*
  * libseccomp syscall definitions
Index: libseccomp-2.5.4/src/syscalls.csv
===
--- libseccomp-2.5.4.orig/src/syscalls.csv
+++ libseccomp-2.5.4/src/syscalls.csv
@@ -1,482 +1,482 @@
 #syscall (v5.17.0 
2022-04-05),x86,x86_64,x32,arm,aarch64,loongarch64,mips,mips64,mips64n32,parisc,parisc64,ppc,ppc64,riscv64,s390,s390x
-accept,PNR,43,43,285,202,168,42,42,35,35,330,330,202,PNR,PNR
-accept4,364,288,288,366,242,334,293,297,320,320,344,344,242,364,364
-access,33,21,21,33,PNR,33,20,20,33,33,33,33,PNR,33,33
-acct,51,163,163,51,89,51,158,158,51,51,51,51,89,51,51
-add_key,286,248,248,309,217,280,239,243,264,264,269,269,217,278,278
-adjtimex,124,159,159,124,171,124,154,154,124,124,124,124,171,124,124
-afs_syscall,137,183,183,PNR,PNR,137,176,176,PNR,PNR,137,137,PNR,137,137
-alarm,27,37,37,PNR,PNR,27,37,37,27,27,27,27,PNR,27,27
-arch_prctl,384,158,158,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-arm_fadvise64_64,PNR,PNR,PNR,270,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-arm_sync_file_range,PNR,PNR,PNR,341,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-bdflush,134,PNR,PNR,134,PNR,134,PNR,PNR,134,134,134,134,PNR,134,134
-bind,361,49,49,282,200,169,48,48,22,22,327,327,200,361,361
-bpf,357,321,321,386,280,355,315,319,341,341,361,361,280,351,351
-break,17,PNR,PNR,PNR,PNR,17,PNR,PNR,PNR,PNR,17,17,PNR,PNR,PNR
-breakpoint,PNR,PNR,PNR,983041,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-brk,45,12,12,45,214,45,12,12,45,45,45,45,214,45,45
-cachectl,PNR,PNR,PNR,PNR,PNR,148,198,198,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-cacheflush,PNR,PNR,PNR,983042,PNR,147,197,197,PNR,PNR,PNR,PNR,PNR,PNR,PNR
-capget,184,125,125,184,90,204,123,123,106,106,183,183,90,184,184
-capset,185,126,126,185,91,205,124,124,107,107,184,184,91,185,185
-chdir,12,80,80,12,49,12,78,78,12,12,12,12,49,12,12
-chmod,15,90,90,15,PNR,15,88,88,15,15,15,15,PNR,15,15
-chown,182,92,92,182,PNR,202,90,90,180,180,181,181,PNR,182,212
-chown32,212,PNR,PNR,212,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,PNR,212,PNR
-chroot,61,161,161,61,51,61,156,156,61,61,61,61,51,61,61
-clock_adjtime,343,305,305,372,266,341,300,305,324,324,347,347,266,337,337
-clock_adjtime64,405,PNR,PNR,405,PNR,405,PNR,405,405,PNR,405,PNR,PNR,405,PNR
-clock_getres,266,229,229,264,114,264,223,227,257,257,247,247,114,261,261
-clock_getres_time64,406,PNR,PNR,406,PNR,406,PNR,406,406,PNR,406,PNR,PNR,406,PNR
-clock_gettime,265,228,228,263,113,263,222,226,256,256,246,246,113,260,260
-clock_gettime64,403,PNR,PNR,403,PNR,403,PNR,403,403,PNR,403,PNR,PNR,403,PNR
-clock_nanosleep,267,230,230,265,115,265,224,228,258,258,248,248,115,262,262

Bug#1036533: Someone got really harmed by the moo

2023-05-21 Thread Miao Wang
Package: iproute2
Version: 5.19.0-1
Severity: important

I understand ip moo is added for fun by debian developers. However, in
commit https://salsa.debian.org/kernel-team/iproute2/-/commit/4aace8c ,
an unexpected effect is introduced.

Originally, ``moo" is listed at the end of the possible command list,
which makes no difference on normal invocation. However, in this commit,
``moo" is listed after ``macsec", well before ``monitor". Those who use
``mo" as an abbreviation of ``monitor" are really harmed by this patch.

I suggest ``moo" should be listed to the end, after ``help".

Cheers,

Miao Wang



Bug#973861: apt: http acquire method still failing with "Undetermined error" or "Data left in the buffer"

2023-02-03 Thread Miao Wang
Hi,

On Thu, 21 Jan 2021 15:27:40 + Witold Baryluk  
wrote:
> Package: apt
> Version: 2.1.18
> Followup-For: Bug #973861
> X-Debbugs-Cc: witold.bary...@gmail.com, mir...@init7.net
> 
> I started getting this error recently too.
> 
> To the point that using live-build (that downloads ~6100 package in one
> go) is not possible, because some package will fail to download and fail
> entire apt install request.
> 
> 
> This is related to keepalive.
> 
> For example most nginx server has keepalive_requests 100 by default. That
> is, after serving 100 request, nginx server will close the connection.
> This is because some dynamic memory allocated by nginx is allocated on
> arenas that are tied to TCP connection, and they are never freed until
> the connection is closed. This is a high performance design, but to
> prevent leaks and abuse, the connection must be closed after some number
> of requests.
> 
> Most tools (wget), respect the response from the server, close the
> existing connection and open a new one. It is easy to see with wget -i -
> and feeding the same file 1 times. Every 100th request will start a
> new TCP connection.
> 
> 
> In apt this manifests as some XX00 request failing.
> 
> Get:4500 http://mirror.init7.net/debian bullseye/main amd64 libplymouth5 
> amd64 0.9.5-2 [108 kB]
> Err:4500 http://mirror.init7.net/debian bullseye/main amd64 libplymouth5 
> amd64 0.9.5-2
>   Undetermined Error [IP: 2001:1620::1620 80]
> 
> 
> Get:1600 http://mirror.init7.net/debian bullseye/main amd64 libastyle3 amd64 
> 3.1-2+b1 [109 kB]
> Err:1600 http://mirror.init7.net/debian bullseye/main amd64 libastyle3 amd64 
> 3.1-2+b1]
>   Undetermined Error [IP: 2001:1620::1620 80]
> 
> 
> 
> This is repeatable and reproducible. I can try 10 times doing the
> download, and every time the same file and number will fail. (Sometimes I
> might get lucky and one of them will succeed, but not ther other).
> 
> I don't know why files 100, 200, 300, ... doesn't fail, but it looks like
> some bug in apt in general.
> 
> (The above files do exist and are served correctly by the server).
> 
> 
> Does apt use maybe HTTP pipelining in addition to keepalive, that causes
> issues? Or maybe in general the retry logic is broken somehow.
> 
> I wasn't able to reproduce this issue with Fastly CDN or Apache 2.4,
> probably because they use different keepalive request limit policy. It
> might be a bug in nginx too. I am not sure. The server I was using
> appears to be using nginx/1.14.2.

I recently reported this issue to nginx developers and they have issued
a fix for handling the close of pipelined connections.

See: https://hg.nginx.org/nginx/rev/cffaf3f2eec8

> 
> Regards,


Cheers,

Miao Wang


Bug#1009313: RFS: nginx/1.18.0-10 -- small, powerful, scalable web/proxy server

2022-04-12 Thread Miao Wang



> 2022年04月12日 15:33,Bastian Germann  写道:
> 
> Am 12.04.22 um 05:00 schrieb Miao Wang:
>> I intended to leave it UNRELEASED so it can serve as a request for comment. 
>> However, every time I upload an UNRELEASED package, it gets deleted 
>> automatically. As a result, I have to set the codename to unstable for 
>> successful uploading.
> 
> You misunderstood. You left a -9 revision UNRELELEASED and skipped it while 
> publishing a -10 revision.

Yes, it is intended, because currently the version number of nginx is -9 in 
https://salsa.debian.org/nginx-team/nginx/-/blob/master/debian/changelog .

> 
> Do you say, you did not contact the nginx team upfront about this? If so, I 
> am going to close this and wait for you to get in contact with the team.

I did contact nginx team via e-mail privately about 3 weeks ago and 3 days ago 
and hasn't received any reply.

Cheers,

Miao Wang



Bug#1009313: RFS: nginx/1.18.0-10 -- small, powerful, scalable web/proxy server

2022-04-11 Thread Miao Wang
Hi,

Thanks for your time on this package. I fully understand splitting the source 
package is a major change on the package scheme. I intended to leave it 
UNRELEASED so it can serve as a request for comment. However, every time I 
upload an UNRELEASED package, it gets deleted automatically. As a result, I 
have to set the codename to unstable for successful uploading.

Cheers,

Miao Wang

> 2022年04月12日 04:24,Bastian Germann  写道:
> 
> Control: tags -1 moreinfo
> 
> Hi Miao,
> 
> Please do not skip a version (or leave it UNRELEASED). If this is a team 
> upload (not in changelog...) and the team has confirmed splitting the 
> package, please reference the okay statement. Else, nobody will touch this 
> massive change.
> 
> I am tagging moreinfo. When you have provided the requested info, please 
> untag.
> 
> Thanks,
> Bastian



Bug#1009313: RFS: nginx/1.18.0-10 -- small, powerful, scalable web/proxy server

2022-04-11 Thread Miao Wang
urgency=medium
 .
   * Initial release.

 ngx-auth-pam (1:1.5.3-1) unstable; urgency=medium
 .
   * Initial release.

 ngx-ndk (1:0.3.1-1) unstable; urgency=medium
 .
   * Initial release.
   
 ngx-cache-purge (2.3-1) unstable; urgency=medium
 .
   * Initial release.
   
 ngx-subs-filter (1:0.6.4-1) unstable; urgency=medium
 .
   * Initial release.

 ngx-fancyindex (1:0.5.2-1) unstable; urgency=low
 .
   * Initial release.

 ngx-dav-ext (3.0.0-1) unstable; urgency=medium
 .
   * Initial release.

 ngx-lua (1:0.10.13-1) unstable; urgency=medium
 .
   * Initial release.


Regards,

Miao Wang


Bug#995567: Can't handle cross-signed Let's Encrypt CA

2021-10-09 Thread Miao Wang
control: tag -1 + patch

A fix has been merged by upstream.

https://github.com/lavv17/lftp/commit/285c61c



Bug#992231: --delay-updates leaves stale partial data and causes files to never be updated

2021-08-16 Thread Miao Wang
Package: rsync
Version: 3.2.3-4
Severity: important
Tags: patch, fixed-upstream
Control: found -1 3.2.0-1

Dear Maintainer,

I ran into a bug which prevents files in partial data directory from updated. 
I believe it is due to the upstream bug reported there:

https://github.com/WayneD/rsync/issues/192

There have been fixes and backporting from upstream. I wonder if the patches
can be applied to bullseye-pu and buster-backports?

Cheers,

Miao Wang