Bug#1042730:
Control: retitle -1 bookworm-pu: package zfs-linux/2.1.11-1+deb12u1 Hi, Please find a further updated version of debdiff in the attachment, it includes the fix for Bug #1056752 which is a data loss issue. The debdiff itself looks very large (2298 insertions), but filtering the actual changes there are quite a lot of upstream commit messages and noises of test cases: $ cd zfs-linux-2.1.11/debian/patches/ $ diffstat 001[2-9]*.patch 002*.patch b/cmd/zed/agents/zfs_mod.c |2 b/cmd/zed/agents/zfs_retire.c |8 + b/contrib/bash_completion.d/zfs.in |2 b/contrib/initramfs/scripts/zfs |6 - b/contrib/pam_zfs_key/pam_zfs_key.c | 13 -- b/include/sys/spa.h |1 b/module/os/linux/spl/spl-kmem-cache.c | 12 ++ b/module/os/linux/zfs/zfs_vnops_os.c |6 + b/module/zfs/dmu_recv.c | 26 + b/module/zfs/dmu_send.c |8 + b/module/zfs/dnode.c | 12 ++ b/module/zfs/mmp.c |2 b/module/zfs/spa.c |5 - b/module/zfs/spa_misc.c | 29 +- b/module/zfs/vdev.c | 12 ++ b/module/zfs/vdev_label.c |3 b/module/zfs/vdev_trim.c | 28 -- b/module/zfs/zil.c |1 b/tests/runfiles/common.run |2 b/tests/runfiles/sanity.run |1 b/tests/zfs-tests/tests/functional/cli_root/zpool_import/Makefile.am |1 b/tests/zfs-tests/tests/functional/cli_root/zpool_import/import_log_missing.ksh | 75 + b/tests/zfs-tests/tests/functional/cli_root/zpool_resilver/Makefile.am |3 b/tests/zfs-tests/tests/functional/cli_root/zpool_resilver/zpool_resilver_concurrent.ksh | 101 +++ b/tests/zfs-tests/tests/functional/l2arc/persist_l2arc_001_pos.ksh | 19 +--- b/tests/zfs-tests/tests/functional/rsend/Makefile.am |1 b/tests/zfs-tests/tests/functional/rsend/send_encrypted_freeobjects.ksh | 87 +++ cmd/zed/agents/zfs_retire.c |5 + include/sys/spa.h |2 module/zfs/spa.c | 15 +++ module/zfs/vdev.c | 24 - tests/runfiles/common.run |9 +- 32 files changed, 460 insertions(+), 61 deletions(-) There are totally 299 changes in tests which are mostly insertions. Thanks, Aron zfs-linux_2.1.11-1+deb12u1.debdiff Description: Binary data
Bug#1042730: bookworm-pu: package zfs-linux/2.1.12-1~deb12u1
Control: tag -1 - moreinfo Hi, On Wed, Aug 2, 2023 at 3:57 AM Jonathan Wiltshire wrote: > > On Mon, Jul 31, 2023 at 03:53:23PM +0800, Aron Xu wrote: > > zfs-linux in bookworm is affected by #1040183 which is considered an > > important malfunction. > > Please cherry-pick a fix for this and propose a new debdiff; the upstream > release contains too much else to be accepted. > I've tried to narrow down to a couple of stability fixes, with explanations for each patch in d/changelog, would you mind having a look? Thanks, Aron zfs-linux_2.1.11-1+deb12u1.debdiff Description: Binary data
Bug#1006551: bullseye-pu: package tiff/4.2.0-1+deb11u1
Hi SRMs, I think this can be closed since tiff already has the deb11u4 version in bullseye through a previous security update. Regards, Aron
Bug#1040041: bookworm-pu: package dnf/4.14.0-3+deb12u1
Hi! On Sat, Jul 1, 2023 at 10:44 PM Frédéric Pierret wrote: > > Hello Aron, > I'm sorry for the delay, I'm just getting out of Holidays and other duties. > If anything should be done, let me know. > > Also, I rely a lot on Holger for pushing stuff, and I need to candidate for > DM/DD, just need to find time to do that. > Fully understand and that's perfectly OK. I'm just trying to speed up the process since everyone can propose a proposed-updates to stable release unless the maintainer has objections, which I don't think we are in the case, ;-) Regards, Aron
Bug#1040041: bookworm-pu: package dnf/4.14.0-3+deb12u1
On Sat, Jul 1, 2023 at 10:47 PM Adam D. Barratt wrote: > > Control: tags -1 + confirmed > > On Sat, 2023-07-01 at 22:13 +0800, Aron Xu wrote: > > Fix bug in stable release affecting dependent package (Bug #1034828, > > affecting src:dnf-plugins-core). > > > > We generally prefer codenames - i.e. "bookworm" - rather than suites > (i.e. "stable") in changelogs. > > Please go ahead. > Uploaded, with changelog entry aligned to use "bookworm" instead of "stable". Thanks! Aron
Bug#1040041: bookworm-pu: package dnf/4.14.0-3+deb12u1
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: d...@packages.debian.org Hi, [ Reason ] Fix bug in stable release affecting dependent package (Bug #1034828, affecting src:dnf-plugins-core). [ Impact ] Unfixed bug, dnf-plugins-core will not work with default configuration. [ Tests ] dnf has a testsuite, run at build time. [ Risks ] Only change defaults to Debian's python dist-packages path, risk is minimal. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable The proposed debdiff is identical to the version in unstable (4.14.0-4) except filtering out an indentation change in d/rules. [ Changes ] dnf encodes PYTNON_INSTALL_DIR into it's PLUGINPATH during build, which is not desired Debian's dist-packages path, thus packaged plugins are not found. This update changes it to a value corrospond to Debian defaults. Regards, Aron dnf_4.14.0-3+deb12u1.debdiff Description: Binary data
Bug#1032237: bullseye-pu: zfs-linux/2.0.3-9+deb11u1
Control: tags -1 - moreinfo On Sun, Apr 2, 2023 at 3:10 AM Adam D. Barratt wrote: > > Control: tags -1 + moreinfo > > On Thu, 2023-03-02 at 15:33 +0800, Aron Xu wrote: > > I would like to apply a few patches to address some stability issues > > in the > > zfs-linux package in bullseye. All the patches are cherry-picked from > > upstream > > > > 2.0.x and 2.1.x stable branches. > > > > +This change reworks the zfs_file_[get|put] interface to not rely > +on the file descriptor but instead pass the zfs_file_t pointer around. > > I'm assuming that nothing outside of zfs-linux depends on the signature > of the affected functions? > No, there are no other packages depending on the signature of the affected functions. Regards, Aron
Bug#1033614: unblock: zfs-linux/2.1.9-3
Package: release.debian.org Severity: normal User:release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc:pkg-zfsonlinux-de...@alioth-lists.debian.net Please unblock the package zfs-linux/2.1.9-3. [ Reason ] zfs-linux has autopkgtest but it never passed on armel (because the kernel header detection logic), even though this is marked as "Not a regression" auto-migration is blocked. See https://ci.debian.net/packages/z/zfs-linux/testing/armel/ Changes included are targeted small fixes based on upstream 2.1.10-staging branch, which is intended for releasing the next stable minor release. Most importantly, there is a change fixing https://github.com/openzfs/zfs/issues/14599 which we have in the previous 2.1.9-2 that would affect some users from booting the system. [ Impact ] The user won't notice any difference except some bugs have been fixed. [ Tests ] Manually installed the binaries and verified that things work as expected. [ Risks ] Changes are minimal. I can't think of any negative side effects. Because some of the new patches are added to series file in the middle, it results in quite some noise in the debdiff (some old patches are shown as removed). To help reviewing the patches, the commit itself can be found on salsa: https://salsa.debian.org/zfsonlinux-team/zfs/-/commit/a02ecc74c240e64ead560091ae68f2252b072adf New patches are: * 0002-System-wide-speculative-prefetch-limit.patch include/sys/arc_impl.h | 1 + module/zfs/dmu_zfetch.c | 29 - 2 files changed, 25 insertions(+), 5 deletions(-) * 0003-Add-missing-increment-to-dsl_deadlist_move_bpobj.patch module/zfs/dsl_deadlist.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) * 0008-initramfs-fix-zpool-get-argument-order.patch contrib/initramfs/scripts/zfs | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) * 0011-Fix-for-mountpoint-legacy.patch contrib/initramfs/scripts/zfs | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) * 0012-QAT-Fix-uninitialized-seed-in-QAT-compression.patch module/os/linux/zfs/qat_compress.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) [ Checklist ] [x] all changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock zfs-linux/2.1.9-3 zfs-linux_2.1.9-3.debdiff Description: Binary data
Bug#1032863: unblock: mitmproxy/8.1.1-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: mitmpr...@packages.debian.org Control: affects -1 + mitmproxy Dear Release Team, Could you unblock package mitmproxy/8.1.1-2, in this version it applies an upstream patch to fix Python 3.11 compatibility, otherwise the package would fail to start, although the original bug report (#1031787) wasn't marked RC. Regards, Aron diff -Nru mitmproxy-8.1.1/debian/changelog mitmproxy-8.1.1/debian/changelog --- mitmproxy-8.1.1/debian/changelog2023-02-06 00:00:42.0 +0800 +++ mitmproxy-8.1.1/debian/changelog2023-03-03 01:21:00.0 +0800 @@ -1,3 +1,10 @@ +mitmproxy (8.1.1-2) unstable; urgency=medium + + * Team upload. + * Add upstream patch to fix Python 3.11 compatibility (Closes: #1031787) + + -- Aron Xu Fri, 03 Mar 2023 01:21:00 +0800 + mitmproxy (8.1.1-1) unstable; urgency=high * Team upload diff -Nru mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch --- mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch 1970-01-01 08:00:00.0 +0800 +++ mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch 2023-03-03 01:20:48.0 +0800 @@ -0,0 +1,34 @@ +From 55a64b7ad993fd52fbff19f33e3c6e153b3e8d9b Mon Sep 17 00:00:00 2001 +From: rathann +Date: Sat, 23 Jul 2022 10:15:03 +0200 +Subject: [PATCH] use default_factory for parser_options field (#5476) + +* use default_factory for field parser_options + +When running mitmproxy under python 3.11, the following exception +is thrown otherwise: +``` +ValueError: mutable default for field parser_options is not allowed: use default_factory +``` + +Fixes #5474. +--- + mitmproxy/contentviews/grpc.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/mitmproxy/contentviews/grpc.py b/mitmproxy/contentviews/grpc.py +index a5ef99708..5c73220c8 100644 +--- a/mitmproxy/contentviews/grpc.py b/mitmproxy/contentviews/grpc.py +@@ -951,7 +951,7 @@ def format_grpc( + + @dataclass + class ViewConfig: +-parser_options: ProtoParser.ParserOptions = ProtoParser.ParserOptions() ++parser_options: ProtoParser.ParserOptions = field(default_factory=ProtoParser.ParserOptions) + parser_rules: list[ProtoParser.ParserRule] = field(default_factory=list) + + +-- +2.30.2 + diff -Nru mitmproxy-8.1.1/debian/patches/series mitmproxy-8.1.1/debian/patches/series --- mitmproxy-8.1.1/debian/patches/series 2023-02-06 00:00:42.0 +0800 +++ mitmproxy-8.1.1/debian/patches/series 2023-03-03 01:19:49.0 +0800 @@ -3,3 +3,4 @@ 0004-Remove-test_cibuild.py.patch 0005-Remove-test_readfile.py.patch 0006-Delete-asciinema-for-which-we-only-have-minified-ver.patch +0007-use-default_factory-for-parser_options-field-5476.patch signature.asc Description: PGP signature
Bug#1032237: bullseye-pu: zfs-linux/2.0.3-9+deb11u1
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-CC: pkg-zfsonlinux-de...@alioth-lists.debian.net Dear release team, I would like to apply a few patches to address some stability issues in the zfs-linux package in bullseye. All the patches are cherry-picked from upstream 2.0.x and 2.1.x stable branches. * 0002-Initialize-ZIL-buffers.patch zio_crypt.c |1 + 1 file changed, 1 insertion(+) * 0003-Fix-crash-in-zio_done-error-reporting.patch zio.c |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) * 0004-Fix-AVX512BW-Fletcher-code-on-AVX512-but-not-BW-mach.patch zfs_fletcher_avx512.c |8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) * 0005-Fix-zfs_get_data-access-to-files-with-wrong-generati.patch cmd/ztest/ztest.c |4 ++-- include/sys/zil.h |3 ++- include/sys/zvol_impl.h|4 ++-- module/os/linux/zfs/zfs_vnops_os.c | 14 +- module/zfs/zfs_log.c |5 + module/zfs/zil.c |3 ++- module/zfs/zvol.c |3 ++- 7 files changed, 28 insertions(+), 8 deletions(-) * 0006-Linux-always-check-or-verify-return-of-igrab.patch include/os/linux/zfs/sys/zfs_znode_impl.h |8 +++- module/os/linux/zfs/zfs_ctldir.c |3 ++- module/os/linux/zfs/zfs_vfsops.c |6 +- module/os/linux/zfs/zpl_inode.c |3 ++- 4 files changed, 16 insertions(+), 4 deletions(-) * 0007-Avoid-deadlock-when-removing-L2ARC-devices-under-I-O.patch arc.c | 17 ++--- zio.c |3 --- 2 files changed, 6 insertions(+), 14 deletions(-) * 0008-file-reference-counts-can-get-corrupted.patch include/sys/fm/util.h |5 +++-- include/sys/zfs_file.h |6 -- include/sys/zfs_ioctl.h |2 +- include/sys/zfs_onexit.h|4 ++-- lib/libzpool/kernel.c | 20 +--- module/os/freebsd/zfs/zfs_file_os.c | 19 ++- module/os/linux/zfs/zfs_file_os.c | 28 +++- module/zfs/fm.c | 20 module/zfs/zfs_ioctl.c | 71 ++- module/zfs/zfs_onexit.c | 23 +-- 10 files changed, 91 insertions(+), 107 deletions(-) * 0009-libshare-nfs-don-t-leak-nfs_lock_fd-when-lock-fails.patch freebsd/nfs.c | 13 + linux/nfs.c | 13 + 2 files changed, 18 insertions(+), 8 deletions(-) Regards, Aron diff -Nru zfs-linux-2.0.3/debian/changelog zfs-linux-2.0.3/debian/changelog --- zfs-linux-2.0.3/debian/changelog2021-07-01 13:44:20.0 +0800 +++ zfs-linux-2.0.3/debian/changelog2023-03-02 00:15:02.0 +0800 @@ -1,3 +1,9 @@ +zfs-linux (2.0.3-9+deb11u1) bullseye; urgency=medium + + * cherry-pick upstream fixes for stability issues + + -- Aron Xu Thu, 02 Mar 2023 00:15:02 +0800 + zfs-linux (2.0.3-9) unstable; urgency=medium * Cherry-pick "Remove iov_iter_advance() for iter_write" (Closes: #989373) diff -Nru zfs-linux-2.0.3/debian/patches/0002-Initialize-ZIL-buffers.patch zfs-linux-2.0.3/debian/patches/0002-Initialize-ZIL-buffers.patch --- zfs-linux-2.0.3/debian/patches/0002-Initialize-ZIL-buffers.patch 1970-01-01 08:00:00.0 +0800 +++ zfs-linux-2.0.3/debian/patches/0002-Initialize-ZIL-buffers.patch 2023-02-27 15:29:01.0 +0800 @@ -0,0 +1,31 @@ +From e219935f10f6f604a3dafb4727715c3741480fd4 Mon Sep 17 00:00:00 2001 +From: Brian Behlendorf +Date: Fri, 5 Mar 2021 14:45:13 -0800 +Subject: [PATCH] Initialize ZIL buffers + +When populating a ZIL destination buffer ensure it is always +zeroed before its contents are constructed. + +Reviewed-by: Matthew Ahrens +Reviewed-by: Tom Caputi +Signed-off-by: Brian Behlendorf +Closes #11687 +--- + module/os/linux/zfs/zio_crypt.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/module/os/linux/zfs/zio_crypt.c b/module/os/linux/zfs/zio_crypt.c +index 96dabe55a..e2abc0ae2 100644 +--- a/module/os/linux/zfs/zio_crypt.c b/module/os/linux/zfs/zio_crypt.c +@@ -1399,6 +1399,7 @@ zio_crypt_init_uios_zil(boolean_t encrypt, uint8_t *plainbuf, + nr_src = 1; + nr_dst = 0; + } ++ bzero(dst, datalen); + + /* find the start and end record of the log block */ + zilc = (zil_chain_t *)src; +-- +2.30.2 + diff -Nru zfs-linux-2.0.3/debian/patches/0003-Fix-crash-in-zio_done-error-reporting.patch zfs-linux-2.0.3/debian/patches/0003-Fix-crash-in-zio_done-error-reporting.patch --- zfs-linux-2.0.3/debian/patches/0003-Fix-crash-in-zio_done-error-reporting.patch 1970-01-01 08:00:00.0 +0800 +++ zfs-linux-2.0.3/debian/patches/0003-Fix-crash-in-zio_done-error-reporting.patch 2023-02-27 15:33:33.0 +0800 @@ -0,0 +1,4
Bug#985590: (pre-approval) unblock: zfs-linux/2.0.3-2
Hi, On Tue, Mar 30, 2021 at 4:17 AM Paul Gevers wrote: > [...] > > > 3. Add new debconf questions, for the cron jobs of pool scrub and trim, with > >translation updates from debian-i18n people. > > But here, I think there's a serious issue. You seem to be querying the > debconf database during cron jobs, but debconf is not a registry. This > is not acceptable. Lintian warns about this too: > https://lintian.debian.org/tags/debconf-is-not-a-registry.html > > I suggest you prepare an upload with 1 and 2. I don't feel comfortable > with 3, even if you fix the debconf-is-not-a-registry issue. > I have reverted 3, and attached is the new debdiff. Thanks for the comments! Cheers, Aron zfs-linux_2.0.3-2.debdiff.gz Description: application/gzip
Bug#985590: (pre-approval) unblock: zfs-linux/2.0.3-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Dear release team, Please pre-approve unblock package zfs-linux/2.0.3-2. This revision is mainly consisted of the following enhancements: 1. Cherry-pick of upstream changes after 2.0.3, which is a subset of 2.0.4 with irrelevant linux 5.12 compat and other stuff removed, making it a pure bug fix update; 2. Fixed update failure from buster-bpo (#983401); 3. Add new debconf questions, for the cron jobs of pool scrub and trim, with translation updates from debian-i18n people. Regards, Aron Xu zfs-linux_2.0.3-2.debdiff.gz Description: application/gzip signature.asc Description: PGP signature
Bug#983298: unblock: ocserv/1.1.2-2
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Dear release team, This is a pre-approval request that please unblock package ocserv/1.1.2-2, which is a version with cherry picked upstream bug fixes. unblock ocserv/1.1.2-2 Regards, Aron diff -Nru ocserv-1.1.2/debian/changelog ocserv-1.1.2/debian/changelog --- ocserv-1.1.2/debian/changelog 2020-12-17 18:38:57.0 +0800 +++ ocserv-1.1.2/debian/changelog 2021-02-22 11:37:07.0 +0800 @@ -1,3 +1,9 @@ +ocserv (1.1.2-2) unstable; urgency=medium + + * d/patches: cherry-pick upstream post 1.1.2 bug fixes + + -- Aron Xu Mon, 22 Feb 2021 11:37:07 +0800 + ocserv (1.1.2-1) unstable; urgency=medium * New upstream version 1.1.2 diff -Nru ocserv-1.1.2/debian/patches/0009-update_auth_time_stats-cast-operations-to-avoid-over.patch ocserv-1.1.2/debian/patches/0009-update_auth_time_stats-cast-operations-to-avoid-over.patch --- ocserv-1.1.2/debian/patches/0009-update_auth_time_stats-cast-operations-to-avoid-over.patch 1970-01-01 08:00:00.0 +0800 +++ ocserv-1.1.2/debian/patches/0009-update_auth_time_stats-cast-operations-to-avoid-over.patch 2021-02-22 11:33:03.0 +0800 @@ -0,0 +1,27 @@ +From e035221030f8fdfbb38483889631916fef9d9798 Mon Sep 17 00:00:00 2001 +From: Nikos Mavrogiannopoulos +Date: Wed, 9 Dec 2020 15:05:24 +0100 +Subject: [PATCH 09/36] update_auth_time_stats: cast operations to avoid + overflows + +Signed-off-by: Nikos Mavrogiannopoulos +--- + src/sec-mod-auth.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/sec-mod-auth.c b/src/sec-mod-auth.c +index c769643c..b4b2f3fd 100644 +--- a/src/sec-mod-auth.c b/src/sec-mod-auth.c +@@ -131,7 +131,7 @@ static void update_auth_time_stats(sec_mod_st * sec, time_t secs) + + if (secs > sec->max_auth_time) + sec->max_auth_time = secs; +- sec->avg_auth_time = (sec->avg_auth_time*(sec->total_authentications-1)+secs) / sec->total_authentications; ++ sec->avg_auth_time = ((uint64_t)sec->avg_auth_time*((uint64_t)(sec->total_authentications-1))+secs) / (uint64_t)sec->total_authentications; + } + + static +-- +2.20.1 + diff -Nru ocserv-1.1.2/debian/patches/0020-ocserv-worker-renamed-loop-to-worker_loop.patch ocserv-1.1.2/debian/patches/0020-ocserv-worker-renamed-loop-to-worker_loop.patch --- ocserv-1.1.2/debian/patches/0020-ocserv-worker-renamed-loop-to-worker_loop.patch 1970-01-01 08:00:00.0 +0800 +++ ocserv-1.1.2/debian/patches/0020-ocserv-worker-renamed-loop-to-worker_loop.patch 2021-02-22 11:35:22.0 +0800 @@ -0,0 +1,131 @@ +From 47c6638286a694b4d278e01b278f64f9368b3e1a Mon Sep 17 00:00:00 2001 +From: Nikos Mavrogiannopoulos +Date: Sat, 12 Dec 2020 22:41:50 +0100 +Subject: [PATCH 20/36] ocserv-worker: renamed loop to worker_loop + +This avoids warnings and static analyzers complains about +the libev functions hiding the global 'loop' variable + +Signed-off-by: Nikos Mavrogiannopoulos +--- + src/worker-vpn.c | 34 +- + 1 file changed, 17 insertions(+), 17 deletions(-) + +Index: ocserv/src/worker-vpn.c +=== +--- ocserv.orig/src/worker-vpn.c ocserv/src/worker-vpn.c +@@ -95,7 +95,7 @@ struct worker_st *global_ws = NULL; + static int terminate = 0; + static int terminate_reason = REASON_SERVER_DISCONNECT; + +-static struct ev_loop *loop = NULL; ++static struct ev_loop *worker_loop = NULL; + ev_io command_watcher; + ev_io tls_watcher; + ev_io tun_watcher; +@@ -433,8 +433,8 @@ static int setup_dtls_connection(struct + dtls->dtls_session = session; + ev_init(>io, dtls_watcher_cb); + ev_io_set(>io, dtls->dtls_tptr.fd, EV_READ); +- ev_io_start(loop, >io); +- ev_invoke(loop, >io, EV_READ); ++ ev_io_start(worker_loop, >io); ++ ev_invoke(worker_loop, >io, EV_READ); + + return 0; + fail: +@@ -2609,7 +2609,7 @@ static int test_for_tcp_health_probe(str + + static void syserr_cb (const char *msg) + { +- struct worker_st * ws = ev_userdata(loop); ++ struct worker_st * ws = ev_userdata(worker_loop); + int err = errno; + + oclog(ws, LOG_ERR, "libev fatal error: %s / %s", msg, strerror(err)); +@@ -2637,7 +2637,7 @@ static void cstp_send_terminate(struct w + + static void command_watcher_cb (EV_P_ ev_io *w, int revents) + { +- struct worker_st *ws = ev_userdata(loop); ++ struct worker_st *ws = ev_userdata(worker_loop); + + int ret = handle_commands_from_main(ws); + if (ret == ERR_NO_CMD_FD) { +@@ -2723,7 +2723,7 @@ static void invoke_dtls_if_needed(struct + if ((dtls->udp_state > UP_WAIT_FD) && + (dtls->dtls_session != NULL) && + (gnutls_record_check_pending(dtls->dtls_session))) { +- ev_invoke(loop, &g
Bug#956195: buster-pu: package cloud-init/18.3-6+deb10u1
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu X-Debbugs-CC: debian-cl...@lists.debian.org Dear release team, As discussed in #947351, this is a more targeted fix prepared for buster-pu. The updated debdiff is attached. Regards, Aron cloud-init_18.3-6+deb10u1.debdiff Description: Binary data
Bug#947351: package cloud-init
Control: retitile -1 buster-pu: package cloud-init/18.3-6+deb10u1 Control: tags + patch Hi, After a brief discussion with zigo@d.o I'm trying to prepare a stable-pu update of cloud-init to address Bug #936030. I'm reusing the previous release.d.o bug report for 18.3-6 which wasn't closed, please let me know if opening a new one is preferred. Regards, Aron cloud-init_18.3-6+deb10u1.debdiff Description: Binary data
Bug#932251: buster-pu: package spl-linux/0.7.12-2+deb10u1
On Wed, Jul 17, 2019 at 01:41:12AM +, Aron Xu wrote: > Package: release.debian.org > Severity: normal > Tags: buster > User: release.debian@packages.debian.org > Usertags: pu > > Dear release team, > > We would like to apply a single-line patch in addition to spl-linux/0.7.12-2 > which fixes a deadlock[1], please see the changes in debdiff. > > [1]https://github.com/zfsonlinux/spl/commit/cb4464f1549087794fdbe0f5ad2328618de2033e > Please find debdiff in attachment. diff -Nru spl-linux-0.7.12/debian/changelog spl-linux-0.7.12/debian/changelog --- spl-linux-0.7.12/debian/changelog 2019-02-19 04:40:38.0 + +++ spl-linux-0.7.12/debian/changelog 2019-07-17 01:21:03.0 + @@ -1,3 +1,10 @@ +spl-linux (0.7.12-2+deb10u1) buster; urgency=medium + + * debian/patches: +- fix deadlock between mm_sem and tx assign in zfs_write() and page fault + + -- Aron Xu Wed, 17 Jul 2019 01:21:03 + + spl-linux (0.7.12-2) unstable; urgency=medium [ Colin Ian King ] diff -Nru spl-linux-0.7.12/debian/patches/0006-deadlock-between-mm_sem-and-tx-assign-in-zfs_write-a.patch spl-linux-0.7.12/debian/patches/0006-deadlock-between-mm_sem-and-tx-assign-in-zfs_write-a.patch --- spl-linux-0.7.12/debian/patches/0006-deadlock-between-mm_sem-and-tx-assign-in-zfs_write-a.patch 1970-01-01 00:00:00.0 + +++ spl-linux-0.7.12/debian/patches/0006-deadlock-between-mm_sem-and-tx-assign-in-zfs_write-a.patch 2019-07-17 01:16:28.0 + @@ -0,0 +1,44 @@ +From cb4464f1549087794fdbe0f5ad2328618de2033e Mon Sep 17 00:00:00 2001 +From: Tony Hutter +Date: Fri, 18 Jan 2019 10:05:58 -0800 +Subject: [PATCH 1/6] deadlock between mm_sem and tx assign in zfs_write() and + page fault + +(This is the ported SPL portion of this patch) + +The bug time sequence: +1. thread #1, `zfs_write` assign a txg "n". +2. In a same process, thread #2, mmap page fault (which means the +`mm_sem` is hold) occurred, `zfs_dirty_inode` open a txg failed, +and wait previous txg "n" completed. +3. thread #1 call `uiomove` to write, however page fault is occurred +in `uiomove`, which means it need `mm_sem`, but `mm_sem` is hold by +thread #2, so it stuck and can't complete, then txg "n" will +not complete. + +So thread #1 and thread #2 are deadlocked. + +Reviewed-by: Chunwei Chen +Reviewed-by: Brian Behlendorf +Reviewed-by: Matthew Ahrens +Signed-off-by: Grady Wong +Closes #7939 +--- + include/sys/uio.h | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/include/sys/uio.h b/include/sys/uio.h +index 764beb9..47715db 100644 +--- a/include/sys/uio.h b/include/sys/uio.h +@@ -53,6 +53,7 @@ typedef struct uio { + int uio_iovcnt; + offset_tuio_loffset; + uio_seg_t uio_segflg; ++ boolean_t uio_fault_disable; + uint16_tuio_fmode; + uint16_tuio_extflg; + offset_tuio_limit; +-- +2.11.0 + diff -Nru spl-linux-0.7.12/debian/patches/series spl-linux-0.7.12/debian/patches/series --- spl-linux-0.7.12/debian/patches/series 2019-01-18 14:29:38.0 + +++ spl-linux-0.7.12/debian/patches/series 2019-07-17 01:18:28.0 + @@ -3,3 +3,4 @@ 0003-Add-check-for-ktime_get_ts64-for-V5.0-ke.patch 0004-Add-check-for-timespec64-sub.patch 0005-Use-64-bit-timespec-fixes.patch +0006-deadlock-between-mm_sem-and-tx-assign-in-zfs_write-a.patch signature.asc Description: PGP signature
Bug#932251: buster-pu: package spl-linux/0.7.12-2+deb10u1
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Dear release team, We would like to apply a single-line patch in addition to spl-linux/0.7.12-2 which fixes a deadlock[1], please see the changes in debdiff. [1]https://github.com/zfsonlinux/spl/commit/cb4464f1549087794fdbe0f5ad2328618de2033e Regards, Aron signature.asc Description: PGP signature
Bug#930238: unblock: zfs-linux/0.7.12-2+deb10u1 [t-p-u]
Hi, I have tested the package in a virtual machine on amd64 for linux/4.19.37-3 (buster) and a locally built updated linux kernel that breaks zfs-linux/0.7.12-2. The dkms package builds fine with both of the versions and zpool create/export/import works fine. Therefore, please unblock the t-p-u update for buster, thanks. Regards, Aron
Bug#926982: unblock: ocserv/0.12.2-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, Please unblock package ocserv It fixes a segfault problem in the worker binary as described in upstream bug tracker: https://gitlab.com/openconnect/ocserv/issues/197 Attached is the debdiff between 0.12.2-2 and 0.12.2-3. unblock ocserv/0.12.2-3 Regards, Aron ocserv_0.12.2-3.debdiff Description: Binary data
Bug#923770: unblock: zfs-linux/0.7.13-1
Hi, Similar to what I have replied for Bug #923769, this is a new upstream bug fix minor point release, and here are some details. In packaging: 1. Rebase 2332-OpenZFS-8898-creating-fs-with-checksum-skein-on-the-.patch A simple patch rebase. 2. Remove linux 4.20 and 5.0 compat fixes. Included in upstream 0.7.13. See # in the following section. 3. Bump Standards-Version to 4.3.0 (no change). 4. Include new example scripts Installs a new example file `etc/zfs/vdev_id.conf.scsi.example' which is left out unintentionally in previous version. Changes in upstream release are here: https://github.com/zfsonlinux/zfs/commits/zfs-0.7-release In more detail: 1. https://github.com/zfsonlinux/zfs/commit/2428fbbfcf7f1b2298e1e4ee054430ca155144cc Non-significant change to use automake to build initramfs scripts and hooks. 2. https://github.com/zfsonlinux/zfs/commit/edb504f9dbeb2921da2eb669ff052e11c8079e9d Minor fix to make initramfs/dracut able to find mount.zfs mount helper when not installed to /sbin 3. https://github.com/zfsonlinux/zfs/commit/01937958ce85b1cd8942dbaf9a3f9768c5b02a0a Avoid a deadlock by not creating/removing zfs_dbuf_evict_key tsd values, also improves performance a little bit 4. https://github.com/zfsonlinux/zfs/commit/14a5e48fb92210541ffd04081c313f4d6061a4d9 Replace hard coded command cpp with $CPP, to fix cross-compiling. 5. https://github.com/zfsonlinux/zfs/commit/e3fb781c5fdaaba0ee788a1602490dc9e3a7c7d5 Auto load zfs kernel module when needed. Previous behavior is that, there must be an active zpool to make systemd services to load the kernel module at system boot time, otherwise user must run modprobe themselves before using any zfs/zpool command lines. Auto loading would improve user experience but previously we are conservative. 6. https://github.com/zfsonlinux/zfs/commit/f325d76e962fa569503189797ffdd447114db88c Fix a conflict of marco ZFS_MINOR which interferes with Lustre 7. https://github.com/zfsonlinux/zfs/commit/2b8c3cb0c83681d7425fa5bf567e726b7ba975e9 https://github.com/zfsonlinux/zfs/commit/41f7723e9cb260f313f99d667142e37617812fca https://github.com/zfsonlinux/zfs/commit/89019a846b90f933db13082cdfe7c046dee0a210 Helper shell script, udev rule and man page changes, making `vdev_id' command behave similar with SCSI disks to previously supported SAS disks, also make it generates consistently named links in /dev/by-enclosure/ by adding a `enclosure_symlinks' option to this piece of shell script. 8. https://github.com/zfsonlinux/zfs/commit/7e5def8ae0586d1fb9a27411e529ad1a356795c3 Minor fix in man page examples. 9. https://github.com/zfsonlinux/zfs/commit/b0d579bc55a8536fe6313a7627d52206322d39b9 Only affects contributing commits to the project -- make commit subject length limit bump from 50 to 72 characters. 10. https://github.com/zfsonlinux/zfs/commit/44f463824bc78df2d23dd049c3ef57ddaf464feb Add an option to dkms configuration to empower the user to forcibly enable debuginfo generation at dkms build time. 11. https://github.com/zfsonlinux/zfs/commit/98bb45e27ae80145a6ce028df90fccdb23f8901d Deadlock fix, which is useful together with this change in spl-linux: https://github.com/zfsonlinux/spl/commit/cb4464f1549087794fdbe0f5ad2328618de2033e 12. https://github.com/zfsonlinux/zfs/commit/0a3a4d067a40bf3a84fcbe0a4f3869fb1bca8f18 https://github.com/zfsonlinux/zfs/commit/e22bfd814960295029ca41c8e116e8d516d3e730 https://github.com/zfsonlinux/zfs/commit/5c4ec382a76c7c0d6b218fcab5a1c2e035012158 Already cherry-picked in zfs-linux/0.7.12-2 which is now released in upstream tarball. 13. https://github.com/zfsonlinux/zfs/commit/edc2675aed7d05f7ec230874e33c8a20d7402b02 https://github.com/zfsonlinux/zfs/commit/ba8024a2849d347886328a1148d1ed820869a4e2 https://github.com/zfsonlinux/zfs/commit/f45ad7bff6cacb4ca0717a1f6686873136a5aa22 These 4 patches are changes for Linux 5.0 compatibility, and mostly they are conditional applied to higher versions of Linux when detected (most diffs are to m4 and Makefile files to implement such behavior). As spl/zfs are already declared to support up to Linux version 5.0 in debian/linux_compat, we would like to have these compatibility patches applied. 14. https://github.com/zfsonlinux/zfs/commit/2254b2bbbe17a1ad34b016d1605fea49c01461cf Compiler compatibility fix for GCC9.0. Also the command is only used when testing zpool/zfs itself. 15. https://github.com/zfsonlinux/zfs/commit/c32c2f17d06cea5dc298b404fad7696921e490e0 test-runner python3 compatibility. The stuff is only used when running upstream tests. Please unblock zfs-linux/0.7.13-1, thanks. Regards, Aron
Bug#923769: unblock: spl-linux/0.7.13-1
Hi, spl-linux/0.7.13-1 is a new upstream bug fix minor point release, here are some details about the changes: In packaging: 1. Removed 0001-Add-check-for-ktime_get_coarse_real_ts64-for-V5.0-ke.patch: Included in upstream 0.7.13, see #2 in following section. 2. Bump Standards-Version to 4.3.0 (no change). Changes in upstream release are here: https://github.com/zfsonlinux/spl/commits/spl-0.7-release In more detail: 1. https://github.com/zfsonlinux/spl/commit/b80cb0ac2f15ff9eeb776aab037eefc713f8458c Replace hard coded command cpp with $CPP, to fix cross-compiling. 2. https://github.com/zfsonlinux/spl/commit/e2c6e12ef26c86d7a23568ffad5e55d00ab00eba Already cherry-picked in spl-linux/0.7.12-2 which is now released in upstream tarball 3. https://github.com/zfsonlinux/spl/commit/cb4464f1549087794fdbe0f5ad2328618de2033e One liner, part of a deadlock fix, which is useful together with this change in zfs-linux: https://github.com/zfsonlinux/zfs/commit/98bb45e27ae80145a6ce028df90fccdb23f8901d 4. https://github.com/zfsonlinux/spl/commit/2e2babafd8e13ef0bbe46e28fa8fb35aa1e5ebc9 https://github.com/zfsonlinux/spl/commit/8a9030bd9fd6633fdfda3d9d14c80c56aa179a9e https://github.com/zfsonlinux/spl/commit/b237f61564de1dca05d415501889e33e1f0dac20 https://github.com/zfsonlinux/spl/commit/39333e3323b19a76bcef1a210f5636550661f77a These 4 patches are changes for Linux 4.20 and Linux 5.0 compatibility, and mostly they are conditional applied to higher versions of Linux when detected (most diffs are to m4 and Makefile files to implement such behavior). As spl/zfs are already declared to support up to Linux version 5.0 in debian/linux_compat, we would like to have these compatibility patches applied. Please unblock spl-linux/0.7.13-1, thanks. Regards, Aron
Bug#864655: stretch-pu: package trafficserver/7.0.0-5+deb9u1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: pu I'd like to apply the attached patch as first pu for trafficserver in stretch, it fixes the build on kfreebsd and arm architectures. Regards, Aron diff --git a/debian/changelog b/debian/changelog index 8c25b126..7ff51263 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +trafficserver (7.0.0-5+deb9u1) UNRELEASED; urgency=medium + + * Update d/rules to reflect healthcheck being managed as a stable plugin + * Add a patch to fix kfreebsd build + * Add a patch to fix arm build + + -- Jean Baptiste FavreMon, 29 May 2017 14:45:52 +0200 + trafficserver (7.0.0-5) unstable; urgency=medium * Add patch to fix arm* build. (Closes: #857389) diff --git a/debian/patches/0007-fix_build_kfreebsd.patch b/debian/patches/0007-fix_build_kfreebsd.patch new file mode 100644 index ..46f4ac8d --- /dev/null +++ b/debian/patches/0007-fix_build_kfreebsd.patch @@ -0,0 +1,39 @@ +Description: Fix kfreebsd build skipping malloc_np.h include +Author: Jean Baptiste Favre +Origin: other +Last-Update: 2017-03-24 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +--- a/lib/ts/ink_memory.cc b/lib/ts/ink_memory.cc +@@ -27,7 +27,7 @@ + #include "ts/Diags.h" + #include "ts/ink_atomic.h" + +-#if defined(freebsd) ++#if !defined(kfreebsd) && defined(freebsd) + #include // for malloc_usable_size + #endif + +--- a/proxy/Plugin.cc b/proxy/Plugin.cc +@@ -124,7 +124,7 @@ plugin_load(int argc, char *argv[], bool validateOnly) + return false; // this line won't get called since Fatal brings down ATS + } + +-#if defined(freebsd) || defined(darwin) ++#if (!defined(kfreebsd) && defined(freebsd)) || defined(darwin) + optreset = 1; + #endif + #if defined(__GLIBC__) +--- a/proxy/http/remap/RemapConfig.cc b/proxy/http/remap/RemapConfig.cc +@@ -902,7 +902,7 @@ remap_load_plugin(const char **argv, int argc, url_mapping *mp, char *errbuf, in + void *ih = NULL; + TSReturnCode res = TS_SUCCESS; + if (pi->fp_tsremap_new_instance) { +-#if defined(freebsd) || defined(darwin) ++#if (!defined(kfreebsd) && defined(freebsd)) || defined(darwin) + optreset = 1; + #endif + #if defined(__GLIBC__) diff --git a/debian/patches/0008-fix_build_armel.patch b/debian/patches/0008-fix_build_armel.patch new file mode 100644 index ..4b12a506 --- /dev/null +++ b/debian/patches/0008-fix_build_armel.patch @@ -0,0 +1,42 @@ +--- a/plugins/header_rewrite/lulu.h b/plugins/header_rewrite/lulu.h +@@ -48,9 +48,36 @@ uint16_t getPort(sockaddr const *s_socka + #define rmb() __asm__ __volatile__("sync" : : : "memory") + #define wmb() __asm__ __volatile__("" : : : "memory") + #elif defined(__arm__) +-#define mb() __asm__ __volatile__("dmb" : : : "memory") +-#define rmb() __asm__ __volatile__("dmb" : : : "memory") +-#define wmb() __asm__ __volatile__("" : : : "memory") ++ #if defined(__ARM_ARCH_4__) \ ++ || defined(__ARM_ARCH_4T__) \ ++ || defined(__ARM_ARCH_5__) \ ++ || defined(__ARM_ARCH_5E__) \ ++ || defined(__ARM_ARCH_5T__) \ ++ || defined(__ARM_ARCH_5TE__) \ ++ || defined(__ARM_ARCH_5TEJ__) \ ++ || defined(__ARM_ARCH_6__) \ ++ || defined __ARM_ARCH_6J__ \ ++ || defined(__ARM_ARCH_6K__) \ ++ || defined(__ARM_ARCH_6Z) \ ++ || defined(__ARM_ARCH_6ZK__) \ ++ || defined(__ARM_ARCH_6T2__) ++#if defined(__thumb__) ++ // This is just a placeholder and almost certainly not sufficient. ++ #define mb() __asm__ __volatile__ ("" : : : "memory"); ++ #define rmb() __asm__ __volatile__("" : : : "memory") ++ #define wmb() __asm__ __volatile__("" : : : "memory") ++#else // defined(__thumb__) ++ int a = 0, b = 0; ++ #define mb() __asm__ __volatile__ ("mcr p15,0,%0,c7,c10,5" : : "r" (0) : "memory") ++ #define rmb() mb() ++ #define wmb() __asm__ __volatile__("" : : : "memory") ++#endif // defined(__thumb__) ++ #else ++// ARMv7 and later. ++#define mb() __asm__ __volatile__("dmb" : : : "memory") ++#define rmb() __asm__ __volatile__("dmb" : : : "memory") ++#define wmb() __asm__ __volatile__("" : : : "memory") ++ #endif + #elif defined(__mips__) + #define mb() __asm__ __volatile__("sync" : : : "memory") + #define rmb() __asm__ __volatile__("sync" : : : "memory") diff --git a/debian/patches/series b/debian/patches/series index e3a27b9c..9916d6ef 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -11,3 +11,5 @@ 0004-force-use-luajit-system-remove-lib-luajit.patch 0005-fix_documentation_build.patch 0006-fix_arm_build.patch +0007-fix_build_kfreebsd.patch +0008-fix_build_armel.patch diff --git a/debian/rules b/debian/rules index 2c8a1169..8f33657f 100755 --- a/debian/rules +++ b/debian/rules @@ -41,7 +41,7 @@ override_dh_auto_install: ifneq ($(DEB_HOST_ARCH_OS),linux) # Remove Linux-specific plugin
Bug#858813: unblock: iptraf-ng/1:1.1.4-5
Control: retitle -1 unblock: iptraf-ng/1:1.1.4-6 Apparently dak wants to have the version number bumped as well, not only adding an epoch number.
Bug#858813: unblock: iptraf-ng/1:1.1.4-5
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock iptraf-ng/1:1.1.4-5, this update introduces a dummy transition package for iptraf, which is removed by ROM request in Bug #842355[1]. Also an epoch is added because iptraf is 3.0.0 but iptraf-ng is only at version 1.1.4 [1]http://bugs.debian.org/842355 Cheers, Aron
Bug#858607: unblock: ocserv/0.11.6-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock ocserv/0.11.6-2, this update includes four simple patches cherry picked from upstream later releases, used to improve firewall handling and MTU/MSS calculation. Patches are attached. Regards, Aron From 9f735613c496a17461f60a75caf2f394ae781d4c Mon Sep 17 00:00:00 2001 From: Nikos MavrogiannopoulosDate: Thu, 23 Feb 2017 09:54:05 +0100 Subject: [PATCH 7/7] worker-vpn: use TCP_INFO on linux to obtain accurate MTU information This provides a more accurate value than the one obtained using the TCP MSS value. The latter is affected by many factors (such as tcp options), to provide a reliable value. Signed-off-by: Nikos Mavrogiannopoulos --- src/worker-vpn.c | 80 +--- 1 file changed, 48 insertions(+), 32 deletions(-) diff --git a/src/worker-vpn.c b/src/worker-vpn.c index ea80ebd..311fc2a 100644 --- a/src/worker-vpn.c +++ b/src/worker-vpn.c @@ -48,7 +48,7 @@ #include #include -#if defined(__linux__) &&!defined(IPV6_PATHMTU) +#if defined(__linux__) && !defined(IPV6_PATHMTU) # define IPV6_PATHMTU 61 #endif @@ -942,11 +942,45 @@ void mtu_ok(worker_st * ws) x += r % diff; \ } +int get_pmtu_approx(worker_st *ws) +{ + socklen_t sl; + int ret, e; + +#if defined(__linux__) && defined(TCP_INFO) + struct tcp_info ti; + sl = sizeof(ti); + + ret = getsockopt(ws->conn_fd, IPPROTO_TCP, TCP_INFO, , ); + if (ret == -1) { + e = errno; + oclog(ws, LOG_INFO, "error in getting TCP_INFO: %s", + strerror(e)); + return -1; + } else { + return ti.tcpi_pmtu; + } +#else + int max = -1; + + sl = sizeof(max); + ret = getsockopt(ws->conn_fd, IPPROTO_TCP, TCP_MAXSEG, , ); + if (ret == -1) { + e = errno; + oclog(ws, LOG_INFO, "error in getting TCP_MAXSEG: %s", + strerror(e)); + return -1; + } else { + MSS_ADJUST(max); + return max; + } +#endif +} + static int periodic_check(worker_st * ws, struct timespec *tnow, unsigned dpd) { - socklen_t sl; - int max, e, ret; + int max, ret; time_t now = tnow->tv_sec; time_t periodic_check_time = PERIODIC_CHECK_TIME; @@ -1036,20 +1070,11 @@ int periodic_check(worker_st * ws, struct timespec *tnow, unsigned dpd) } if (ws->conn_type != SOCK_TYPE_UNIX && ws->udp_state != UP_DISABLED) { - sl = sizeof(max); - ret = getsockopt(ws->conn_fd, IPPROTO_TCP, TCP_MAXSEG, , ); - if (ret == -1) { - e = errno; - oclog(ws, LOG_INFO, "error in getting TCP_MAXSEG: %s", - strerror(e)); - } else { - MSS_ADJUST(max); - /*oclog(ws, LOG_DEBUG, "TCP MSS is %u", max); */ - if (max > 0 && max < ws->link_mtu) { -oclog(ws, LOG_DEBUG, "reducing MTU due to TCP MSS to %u", - max); -link_mtu_set(ws, max); - } + max = get_pmtu_approx(ws); + if (max > 0 && max < ws->link_mtu) { + oclog(ws, LOG_DEBUG, "reducing MTU due to TCP/PMTU to %u", + max); + link_mtu_set(ws, max); } } @@ -1571,7 +1596,7 @@ static int connect_handler(worker_st * ws) struct http_req_st *req = >req; struct pollfd pfd[4]; unsigned pfd_size; - int e, max, ret, t; + int max, ret, t; char *p; unsigned rnd; #ifdef HAVE_PPOLL @@ -1580,7 +1605,6 @@ static int connect_handler(worker_st * ws) unsigned tls_pending, dtls_pending = 0, i; struct timespec tnow; unsigned ip6; - socklen_t sl; sigset_t emptyset, blockset; sigemptyset(); @@ -1693,19 +1717,11 @@ static int connect_handler(worker_st * ws) /* Attempt to use the TCP connection maximum segment size to set a more * precise MTU. */ if (ws->conn_type != SOCK_TYPE_UNIX) { - sl = sizeof(max); - ret = getsockopt(ws->conn_fd, IPPROTO_TCP, TCP_MAXSEG, , ); - if (ret == -1) { - e = errno; - oclog(ws, LOG_INFO, "error in getting TCP_MAXSEG: %s", - strerror(e)); - } else { - MSS_ADJUST(max); - if (max > 0 && max < ws->vinfo.mtu) { -oclog(ws, LOG_INFO, - "reducing MTU due to TCP MSS to %u (from %u)", max, ws->vinfo.mtu); -ws->vinfo.mtu = max; - } + max = get_pmtu_approx(ws); + if (max > 0 && max < ws->vinfo.mtu) { + oclog(ws, LOG_DEBUG, "reducing MTU due to TCP/PMTU to %u", + max); + link_mtu_set(ws, max); } } -- 2.1.4 From 1233f67c3f89bce5f8300c22de8c745d2ae7e9dd Mon Sep 17 00:00:00 2001 From: Nikos Mavrogiannopoulos Date: Wed, 22 Feb 2017 16:22:55 +0100 Subject: [PATCH 6/7] worker-vpn: corrected calculation for MTU via TCP MSS Signed-off-by: Nikos Mavrogiannopoulos --- src/worker-vpn.c | 16 +--- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/src/worker-vpn.c b/src/worker-vpn.c index 2a00ef9..ea80ebd 100644 --- a/src/worker-vpn.c +++ b/src/worker-vpn.c @@ -74,6 +74,13 @@ #define CSTP_DTLS_OVERHEAD 1 #define CSTP_OVERHEAD 8 +#define IP_HEADER_SIZE 20 +#define IPV6_HEADER_SIZE 40 +#define TCP_HEADER_SIZE 20 +#define UDP_HEADER_SIZE 8 + +#define
Bug#858339: unblock: zfs-linux/0.6.5.9-5
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock zfs-linux/0.6.5.9-5, this update includes some fixes for root zpool setup. It is stacked upon 0.6.5.9-3 which was unblocked by not made into testing because of further uploads. Debdiff from 0.6.5.9-3 is attached. Regards, Aron zfs-linux_0.6.5.9-5.debdiff Description: Binary data
Bug#857611: unblock: zfs-linux/0.6.5.9-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock zfs-linux/0.6.5.9-3, this update includes some fixes for specific initramfs setup (merged /usr), autopkgtest fix, as well as translation updates. Debdiff is attached. Regards, Aron zfs-linux_0.6.5.9-3.debdiff Description: Binary data
Bug#854972: unblock: spl-linux and zfs-linux
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Hi Release Team, Please unblock spl-linux/0.6.5.9-1 and zfs-linux/0.6.5.9-2. The latter is an upstream point release that has included fix for Linux 4.9 compatibility (Closes: #851513), and it depends on the newer point release of spl-linux. Thanks, Aron
Bug#837529: nmu: ocserv
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hi, With radcli/1.2.6-3 upload, radcli ships the pkgconfig file, so that ocserv needs a rebuild to pick up proper radius support to close #820894. nmu ocserv_0.11.4-1 . ANY . unstable . -m "Rebuild with radcli_1.2.6-3" Regards, Aron
Bug#836506: nmu: fcitx-fbterm_0.2.0-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hi, As noticed by Jeremy Bicha, fcitx-fbterm needs a rebuild to catch up with current fcitx libraries because it still depends on the transitional package fcitx-libs, thus I'm submitting this request. nmu fcitx-fbterm_0.2.0-2 . ANY . unstable . -m "Rebuild against fcitx 1:4.2.9.1-2 for correct dependencies" Regards, Aron
Re: Porter roll call for Debian Stretch
Hi, I am an active porter for the following architectures and I intend to continue this for the lifetime of Streth release (est. end of 2020): For mips, mipsel and mips64el, I - run several Debian testing/unstable system on real mipsel/mips64el hardware - maintain 3 mipsel/mips64el machines at data center for porting purpose - triage arch-specific bugs - fix arch-related bugs I am a DD. Regards, Aron signature.asc Description: Digital signature
Bug#833589: transition: opencc
On Sun, Aug 7, 2016 at 7:13 PM, ChangZhuo Chen (陳昌倬) <czc...@debian.org> wrote: > On Sun, Aug 07, 2016 at 12:33:45PM +0200, Emilio Pozuelo Monfort wrote: >> On 06/08/16 17:21, Aron Xu wrote: >> > - ibus-libzhuyin: experimental version works > > I will handle this package, thanks for the transition. > opencc is uploaded, please go ahead. Regards, Aron
Bug#833589: transition: opencc
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Hi, I'd like to kick off the opencc transition, which has been in experimental for quite some time. Dependencies: - ibus-libzhuyin: experimental version works - libpyzy: binNMU is okay - librime: new upstream release upload needed, to fix 811637 at the same time Please tell me when I can do uploads to unstable, thanks. Cheers, Aron
Bug#808036: transition: libpinyin
On Wed, Dec 16, 2015 at 1:10 AM, Emilio Pozuelo Monfort <po...@debian.org> wrote: > Control: tags -1 confirmed > > On 15/12/15 13:50, Aron Xu wrote: >> Package: release.debian.org >> Severity: normal >> User: release.debian@packages.debian.org >> Usertags: transition >> X-Debbugs-Cc: pkg-ime-de...@lists.alioth.debian.org >> >> Dear release team, >> >> We would like to get a transition slot for libpinyin 1.3.0. Affected >> source packages: >> >> 1. libpinyin >> 2. fcitx-libpinyin >> 3. ibus-libpinyin >> >> All of the packages are present in experimental. > > Ack. > Looks completed, :) Cheers, Aron
Bug#808036: transition: libpinyin
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition X-Debbugs-Cc: pkg-ime-de...@lists.alioth.debian.org Dear release team, We would like to get a transition slot for libpinyin 1.3.0. Affected source packages: 1. libpinyin 2. fcitx-libpinyin 3. ibus-libpinyin All of the packages are present in experimental. Affected: .depends ~ /\b(libpinyin7|libpinyin7\-dev|libpinyin4|libpinyin4\-dev)\b/ Good: .depends ~ /\b(libpinyin7|libpinyin7\-dev)\b/ Bad: .depends ~ /\b(libpinyin4|libpinyin4\-dev)\b/ Thanks, Aron
Bug#803493: nmu: ns3_3.22+dfsg-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu ns3_3.22+dfsg-1 . ALL . unstable . -m "Rebuild for libstdc++ transition" It was found that there's package in the archive makes use of ns3 when the binary is present, but no dependency is declared[1]. To avoid such problem please binNMU ns3 on all architectures. Thanks, Aron [1]https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791219#21
Audit of the 0-day NMU of libxml2 revert in unstable
Hi, Since there was a 0-day NMU that reverts libxml2 from 2.9.2 to 2.9.1 uploaded to unstable, which is strongly disagreed in discussion, I'm providing a brief audit of problems behind this revert and would kindly ask everyone do not do any 0-day NMU to libxml2 from now on even if you strongly believe you have good reasons, and please _never_ do version revert even if you strongly believe you have good reasons. Known regressions lead by revert: 1. Bug #754424: spurious parser error affecting xmllint 2. Bug #781232: xmlSafeURI: Fails to unparse URI with empty host part Solved by following NMU of libvirt maintainer 3. libicu dbg package was dropped which makes the debug symbols dependency broken 4. Not-approved patch in the name of security update. 5. Long list of NULL pointers, dereferences, and missing checks (upstream side) A new upload of libxml2 has landed in unstable, going to 2.9.2 again with all mentioned problems resolved, RC bugs closed. Thanks, Aron
Bug#782506: [Pkg-ime-devel] Bug#782452: Help to sponsor libcangjie to fix 782452 in Jessie
On Tue, Apr 14, 2015 at 8:25 AM, ChangZhuo Chen czc...@gmail.com wrote: Hi All, Please help to sponsor libcangjie [0] to fix issue 782352 [1], thanks. The unblock request for this version is in 782506 [2], and it needs to be in unstable before before the 9:52 UTC dinstall on Wednesday to catch out Jessie first release. [0] http://anonscm.debian.org/cgit/pkg-ime/libcangjie.git/log/?h=jessie [1] https://bugs.debian.org/782352 [2] https://bugs.debian.org/782506 It's uploaded as 1.2-2 just now. Thanks, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w42=nzk-df1xyzn9dkxpczk5x6vkd0jdfu3oiemozy...@mail.gmail.com
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Sat, 21 Feb 2015 11:38:05 +0100 Ivo De Decker iv...@debian.org wrote: Hi, On Fri, Feb 20, 2015 at 01:55:27AM +0800, Aron Xu wrote: Go ahead, thanks. Uploaded. Unblocked. On PTS it says: * Unblock request by ivodd ignored due to version mismatch: 2.9.1+dfsg1-5 Anything wrong? Cheers, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w5f3amure66o2zdq+ag4bmoc3hikus6g79ds0wtg-+...@mail.gmail.com
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Thu, Feb 19, 2015 at 4:50 AM, Julien Cristau jcris...@debian.org wrote: On Thu, Feb 12, 2015 at 23:37:48 +0800, Aron Xu wrote: On Wed, Feb 11, 2015 at 5:59 AM, Julien Cristau jcris...@debian.org wrote: On Tue, Feb 3, 2015 at 04:02:51 +0800, Aron Xu wrote: Updated version of debdiff, removing the -O3 change. The changelog still says build with -O3. Updated as attached. Go ahead, thanks. Uploaded. Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w79and0txm+ggdyevjut6pzkcrrtjkzta4pvx3ulmy...@mail.gmail.com
Bug#777205: unblock: refpolicy/2:2.20140421-9
On Sun, 8 Feb 2015 22:51:57 +0100 Ivo De Decker iv...@debian.org wrote: tags 777205 wontfix thanks Hi, On Fri, Feb 06, 2015 at 08:45:13PM +1100, Russell Coker wrote: Please unblock package refpolicy The source package refpolicy had been removed from testing. The removal happened in December. Unfortunately, it's too late to allow it back now, so I'll have to deny this request. Cheers, Ivo But this would mean Jessie's SELinux support won't be usable for most normal users, i.e. people must install policies by themselves, without any officially supported policy set available. This could be a significant weakness to users in term of Debian's security infrastructure, would you mind re-consider this request? Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w475Yk0JvrAaX7p1jeU3=wthomi4eb+muozjtfccmq...@mail.gmail.com
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Wed, Feb 11, 2015 at 5:59 AM, Julien Cristau jcris...@debian.org wrote: On Tue, Feb 3, 2015 at 04:02:51 +0800, Aron Xu wrote: Updated version of debdiff, removing the -O3 change. The changelog still says build with -O3. Updated as attached. Cheers, Aron libxml2_2.9.1+dfsg1-5.debdiff Description: Binary data
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Tue, Feb 3, 2015 at 3:54 AM, Julien Cristau jcris...@debian.org wrote: On Tue, Feb 3, 2015 at 02:23:20 +0800, Aron Xu wrote: On Tue, Feb 3, 2015 at 12:02 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On 2015-02-02 6:37, Aron Xu wrote: On Mon, Feb 2, 2015 at 1:13 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: Control: tags -1 + moreinfo On Sun, 2015-02-01 at 16:24 +0800, Aron Xu wrote: +libxml2 (2.9.1+dfsg1-5) testing; urgency=medium + + * Add pkg-config to B-D + * Use -O3 for normal builds Could you expand on the rationale for introducing those now? Particularly as neither appears to be mentioned in the changelogs for the uploads to unstable. These are directly picked from the 2.9.2 upload, which stuck for RC bug. At that time the change was quite big (major release) so those aren't documented in very detail but are in the git for quite some time. Well, the changelog wasn't very detailed for 2.9.2 either. :-) I realise that the changes are in the unstable package (I checked that first), I was more interested in the rationale, particularly for the optimisation change. It's more about a changing attitude on speed/space trade of -O2 and -O3, and more and more apps are using -O3 for release build (e.g. CMake default). If release team believe that's not desired in Jessie, I can keep it out of the way. Anything that's not a minimal fix for a RC bug is not desired for jessie at this stage. Updated version of debdiff, removing the -O3 change. Regards, Aron libxml2_2.9.1+dfsg1-5_2ndtry.debdiff Description: Binary data
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Tue, Feb 3, 2015 at 12:02 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On 2015-02-02 6:37, Aron Xu wrote: On Mon, Feb 2, 2015 at 1:13 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: Control: tags -1 + moreinfo On Sun, 2015-02-01 at 16:24 +0800, Aron Xu wrote: +libxml2 (2.9.1+dfsg1-5) testing; urgency=medium + + * Add pkg-config to B-D + * Use -O3 for normal builds Could you expand on the rationale for introducing those now? Particularly as neither appears to be mentioned in the changelogs for the uploads to unstable. These are directly picked from the 2.9.2 upload, which stuck for RC bug. At that time the change was quite big (major release) so those aren't documented in very detail but are in the git for quite some time. Well, the changelog wasn't very detailed for 2.9.2 either. :-) I realise that the changes are in the unstable package (I checked that first), I was more interested in the rationale, particularly for the optimisation change. It's more about a changing attitude on speed/space trade of -O2 and -O3, and more and more apps are using -O3 for release build (e.g. CMake default). If release team believe that's not desired in Jessie, I can keep it out of the way. Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w7AZj_-0Mvm6xNL4aozuNE4O9-h-DCh99EYDzJ8_=u...@mail.gmail.com
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock jessie-pu libxml2 in Jessie has CVE-2014-3600 pending to be addressed and this update includes the related regression fix as well. Also, I would like to apply some more upstream memory related patches from 2.9.2, mostly NULL checks, because there are quite a lot deeper issues hiding in libxml2's code base and those fixes shall be deemed beneficial to our support cycle. Regards, Aron Xu diff -Nru libxml2-2.9.1+dfsg1/debian/changelog libxml2-2.9.1+dfsg1/debian/changelog --- libxml2-2.9.1+dfsg1/debian/changelog2014-07-09 06:49:45.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/changelog2015-02-01 13:51:11.0 +0800 @@ -1,3 +1,12 @@ +libxml2 (2.9.1+dfsg1-5) testing; urgency=medium + + * Add pkg-config to B-D + * Use -O3 for normal builds + * Cherry-pick upstream memory related fixes +- Including CVE-2014-3660 (Closes: #765722, #768089) + + -- Aron Xu a...@debian.org Sun, 01 Feb 2015 13:48:36 +0800 + libxml2 (2.9.1+dfsg1-4) unstable; urgency=low [ Christian Svensson ] diff -Nru libxml2-2.9.1+dfsg1/debian/control libxml2-2.9.1+dfsg1/debian/control --- libxml2-2.9.1+dfsg1/debian/control 2014-07-09 06:46:15.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/control 2015-02-01 13:42:06.0 +0800 @@ -4,7 +4,7 @@ Maintainer: Debian XML/SGML Group debian-xml-sgml-p...@lists.alioth.debian.org Uploaders: Aron Xu a...@debian.org, YunQiang Su wzss...@gmail.com Standards-Version: 3.9.5 -Build-Depends: debhelper (= 9), dh-autoreconf, autotools-dev, +Build-Depends: debhelper (= 9), dh-autoreconf, autotools-dev, pkg-config, libpython-all-dev, libpython-all-dbg, python-all-dev:any (= 2.7.5-5~), python-all-dbg:any, zlib1g-dev | libz-dev, liblzma-dev diff -Nru libxml2-2.9.1+dfsg1/debian/patches/0001-modify-xml2-config-and-pkgconfig-behaviour.patch libxml2-2.9.1+dfsg1/debian/patches/0001-modify-xml2-config-and-pkgconfig-behaviour.patch --- libxml2-2.9.1+dfsg1/debian/patches/0001-modify-xml2-config-and-pkgconfig-behaviour.patch 2014-07-09 05:31:33.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/patches/0001-modify-xml2-config-and-pkgconfig-behaviour.patch 2015-02-01 13:50:27.0 +0800 @@ -3,11 +3,11 @@ Subject: modify xml2-config and pkgconfig behaviour --- - configure.in |2 +- - libxml-2.0-uninstalled.pc.in |3 ++- - libxml-2.0.pc.in |2 +- - xml2-config.1|4 - xml2-config.in | 22 ++ + configure.in | 2 +- + libxml-2.0-uninstalled.pc.in | 3 ++- + libxml-2.0.pc.in | 2 +- + xml2-config.1| 4 + xml2-config.in | 22 ++ 5 files changed, 18 insertions(+), 15 deletions(-) diff --git a/configure.in b/configure.in diff -Nru libxml2-2.9.1+dfsg1/debian/patches/0002-fix-python-multiarch-includes.patch libxml2-2.9.1+dfsg1/debian/patches/0002-fix-python-multiarch-includes.patch --- libxml2-2.9.1+dfsg1/debian/patches/0002-fix-python-multiarch-includes.patch 2014-07-09 06:46:15.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/patches/0002-fix-python-multiarch-includes.patch 2015-02-01 13:50:27.0 +0800 @@ -3,8 +3,8 @@ Subject: fix python multiarch includes --- - python/Makefile.am |2 +- - python/Makefile.in |2 +- + python/Makefile.am | 2 +- + python/Makefile.in | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/python/Makefile.am b/python/Makefile.am diff -Nru libxml2-2.9.1+dfsg1/debian/patches/0003-Fix-an-error-in-xmlCleanupParser.patch libxml2-2.9.1+dfsg1/debian/patches/0003-Fix-an-error-in-xmlCleanupParser.patch --- libxml2-2.9.1+dfsg1/debian/patches/0003-Fix-an-error-in-xmlCleanupParser.patch 2014-07-09 06:46:15.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/patches/0003-Fix-an-error-in-xmlCleanupParser.patch 2015-02-01 13:50:27.0 +0800 @@ -8,7 +8,7 @@ xmlResetLastError() but the later reallocate the global data freed by previous call. Just swap the two calls. --- - parser.c |2 +- + parser.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/parser.c b/parser.c diff -Nru libxml2-2.9.1+dfsg1/debian/patches/0004-Fix-missing-break-on-last-function-for-attributes.patch libxml2-2.9.1+dfsg1/debian/patches/0004-Fix-missing-break-on-last-function-for-attributes.patch --- libxml2-2.9.1+dfsg1/debian/patches/0004-Fix-missing-break-on-last-function-for-attributes.patch 2014-07-09 06:46:15.0 +0800 +++ libxml2-2.9.1+dfsg1/debian/patches/0004-Fix-missing-break-on-last-function-for-attributes.patch 2015-02-01 13:50:27.0 +0800 @@ -4,7 +4,7 @@ pointed out by cppcheck --- - python/libxml.c |1 + + python/libxml.c | 1 + 1 file changed, 1 insertion(+) diff --git a/python/libxml.c b/python/libxml.c diff -Nru libxml2-2.9.1+dfsg1/debian/patches/0005-xmllint
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Sun, Feb 1, 2015 at 4:24 PM, Aron Xu a...@debian.org wrote: libxml2 in Jessie has CVE-2014-3600 pending to be addressed This should be CVE-2014-3660. Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w7n09xn9bjpz6uxujjghclkajhi4uyj9mi7haqf07g...@mail.gmail.com
Bug#776748: (pre-approval) unblock: libxml2/2.9.1+dfsg1-5 (via t-p-u)
On Mon, Feb 2, 2015 at 1:13 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: Control: tags -1 + moreinfo On Sun, 2015-02-01 at 16:24 +0800, Aron Xu wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock jessie-pu The -pu tags are for stable updates, rather than tpu. I see, thanks. libxml2 in Jessie has CVE-2014-3600 pending to be addressed and this update includes the related regression fix as well. Also, I would like to apply some more upstream memory related patches from 2.9.2, mostly NULL checks, because there are quite a lot deeper issues hiding in libxml2's code base and those fixes shall be deemed beneficial to our support cycle. The changes to patches that haven't materially changed are quite noisy, given the amount of actual changes. +libxml2 (2.9.1+dfsg1-5) testing; urgency=medium + + * Add pkg-config to B-D + * Use -O3 for normal builds Could you expand on the rationale for introducing those now? Particularly as neither appears to be mentioned in the changelogs for the uploads to unstable. These are directly picked from the 2.9.2 upload, which stuck for RC bug. At that time the change was quite big (major release) so those aren't documented in very detail but are in the git for quite some time. Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w5JspY+O=+ov3lo18aqe759zkjmk0mcgumoh0pdc-2...@mail.gmail.com
Bug#769401: unblock: coinutils/2.9.15-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package coinutils/2.9.15-3: * Team upload. * Add liblapack-dev for coinor-libcoinutils-dev to make sure -llapack and -lblas exist as required in the pkgconfig file (Closes: #768753) Bug #768753 is new RC and it is in the reverse dependency chain of libreoffice, thus need such a fix. unblock coinutils/2.9.15-3 Best, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w7otodz+qv2rwbknzurfz6p5xea4wnhhvq-dnukt4o...@mail.gmail.com
Bug#769401:
Please find debdiff as in attachment. Aron coinutils_2.9.15-3.debdiff Description: Binary data
Bug#768836: unblock: ns2/2.35+dfsg-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-CC: pkg-netsim-de...@lists.alioth.debian.org Please unblock package ns2/2.35+dfsg-2: * Team upload. * Remove no longer used DMUA. * Remove xgraph from B-D, disable the support (Closes: #768716) Bug #768716 is new RC and disabling xgraph does not affect usability of the application. unblock ns2/2.35+dfsg-2 Best, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w4tzn6sqknzqyp5dfy4xkbt5vc0qacqarec8bbpc7c...@mail.gmail.com
Bug#768836: unblock: ns2/2.35+dfsg-2
On Sun, Nov 9, 2014 at 11:45 PM, Jonathan Wiltshire j...@debian.org wrote: Control: tag -1 moreinfo On Sun, Nov 09, 2014 at 11:40:17PM +0800, Aron Xu wrote: Please unblock package ns2/2.35+dfsg-2: Please send a debdiff. Please see as attached. Best, Aron ns2_2.35+dfsg-2.debdiff Description: Binary data
Bug#753079: [Pkg-ime-devel] Bug#754199: librime: FTBFS on armel: std::future is broken
On Wed, Jul 9, 2014 at 12:25 AM, Emilio Pozuelo Monfort po...@debian.org wrote: Source: librime Severity: serious Control: block 753079 by -1 librime failed to build on armel because of the std::future brokenness on that platform, see #727621. https://buildd.debian.org/status/fetch.php?pkg=librimearch=armelver=1.1%2Bdfsg-2stamp=1404754412 This is blocking the librime transition. Emilio In such case, do you mind us uploading new upstream releases of fcitx-rime/ibus-rime into unstable right now? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CAMr=8w63DT7cct5EkT9=h9x36rggf34vixe19mngcu9efeb...@mail.gmail.com
Bug#729708: pu: package fcitx-cloudpinyin/0.2.2-1+deb7u1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: pu Dear release team, I would like to apply the following patch to fcitx-cloudpinyin. It uses an anonymous web API service provided Sogou by default, but the API is gone for quite some time and upstream has switched to use Google's similar service by default in newer versions. The service provided by Google is using HTTPS by default, while the original one isn't. Thank you, Aron Xu diff -Nru fcitx-cloudpinyin-0.2.2/debian/changelog fcitx-cloudpinyin-0.2.2/debian/changelog --- fcitx-cloudpinyin-0.2.2/debian/changelog2012-06-06 14:29:06.0 +0800 +++ fcitx-cloudpinyin-0.2.2/debian/changelog2013-11-16 11:08:06.0 +0800 @@ -1,3 +1,9 @@ +fcitx-cloudpinyin (0.2.2-1+deb7u1) wheezy; urgency=low + + * Go with Google by default, original default isn't available anymore. + + -- Aron Xu a...@debian.org Sat, 16 Nov 2013 10:58:08 +0800 + fcitx-cloudpinyin (0.2.2-1) unstable; urgency=low * Imported Upstream version 0.2.2 diff -Nru fcitx-cloudpinyin-0.2.2/debian/patches/default_to_google.patch fcitx-cloudpinyin-0.2.2/debian/patches/ default_to_google.patch --- fcitx-cloudpinyin-0.2.2/debian/patches/default_to_google.patch 1970-01-01 08:00:00.0 +0800 +++ fcitx-cloudpinyin-0.2.2/debian/patches/default_to_google.patch 2013-11-16 10:58:00.0 +0800 @@ -0,0 +1,11 @@ +--- a/src/fcitx-cloudpinyin.desc b/src/fcitx-cloudpinyin.desc +@@ -15,7 +15,7 @@ + + [CloudPinyin/Source] + Type=Enum +-DefaultValue=Sogou ++DefaultValue=Google + Description=Cloud Pinyin Source + EnumCount=4 + Enum0=Sogou diff -Nru fcitx-cloudpinyin-0.2.2/debian/patches/series fcitx-cloudpinyin-0.2.2/debian/patches/series --- fcitx-cloudpinyin-0.2.2/debian/patches/series 1970-01-01 08:00:00.0 +0800 +++ fcitx-cloudpinyin-0.2.2/debian/patches/series 2013-11-16 10:56:25.0 +0800 @@ -0,0 +1 @@ +default_to_google.patch -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w7SnzkXXJvpeqqMCmDJcreE+SYtmxkWgHuj4Gohf=w...@mail.gmail.com
Re: DSA concerns for jessie architectures (mips*)
On Mon, Jun 24, 2013 at 4:51 PM, Peter Palfrader wea...@debian.org wrote: On Sat, 22 Jun 2013, Andreas Barth wrote: * mips: existing machines are either not reliable or too slow to keep up; we suspect that they may not be easily replaceable. Also, if we buy more mipsel machines we could convert the mipsel swarms to mips ones (and so replace broken machines, see below) - mostly depends on how urgent you think this is. If our existing eight-year old hardware is the only mips machines we can reasonably get then that doesn't bode well for mips. We don't think relying on the SWARMs (alone) is an option. * mipsel: the porter machine and some of the buildd machines have an implementation error for one opcode; missing kernel in the archive Different answers - select the one you like most: 1. We could buy a some loongson 2f machines (or newer), see e.g. http://www.tekmote.nl/epages/61504599.sf/nl_NL/?ObjectPath=/Shops/61504599/Products/CFL-006 plus some memory. These machines have kernels in the archive, and not the hardware bug with choking on too many nop-instructions in a row. AIUI these machines have a maximum memory of only 1GB. That's probably OK for now but might be problematic in the long term. 3. We have currently two new machines with loongson 3a processors to test. It will take a bit of time to finally get a working kernel on these, but that would also decrease build-times quite much. When do you expect them to be usable? If not any time soon then maybe we should try to get a couple of loongson 2f machines. Would four machines of this type be sufficient to replace all our exist swarm and 2e machines as buildds? If so, should we just get 5 (4buildd+1porterbox)? We have two 3A notebooks that Lemote donated directly to the student and mentor of the MIPS N32/N64 port GSoC project, the only blocking issue to use them as official buildd is supporting patches aren't accepted by upstream, otherwise they are working fine. A self-built version of Linux 3.6 with Lemote patches is used right now. It was a 4-core SMP system with 2GB RAM installed (upgrade seems hard for the notebook, though the CPU itself supports more), and was tested to be quite stable when doing test build of some mips64el packages. The stability of hardware is somewhat temperature-sensitive, which means when they are running with full parallel building load, they are only tested to be stable in a server room cooling to 17°C, but hang once every 1 or 2 days when put in a room of 25°C. There is no remote management facility available to the notebook, dunno for development boards or servers. We could ask Lemote for donation if we want those machines to provide build power of Debian, and I volunteer to help if needed. Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w55dxzd7sz3r2kfz8cr2+yyrriqpvomlfvykrqx64k...@mail.gmail.com
Re: DSA concerns for jessie architectures (mips*)
On Mon, Jun 24, 2013 at 5:29 PM, Paul Wise p...@debian.org wrote: On Mon, Jun 24, 2013 at 4:51 PM, Peter Palfrader wrote: If our existing eight-year old hardware is the only mips machines we can reasonably get then that doesn't bode well for mips. We don't think relying on the SWARMs (alone) is an option. Perhaps Calvium will interested in providing newer hardware now that there is a MIPS N64 GSoC project underway. They offered some decent hardware last year in association with such a port: http://lists.debian.org/debian-mips/2012/02/msg1.html http://wiki.debian.org/SummerOfCode2013/Projects#MIPS_N32.2FN64_ABI_port http://wiki.debian.org/SummerOfCode2013/StudentApplications/EleanorChen I believe Cavium's David Daney is on debian-mips, we can talk to him to see if there is any possibility of making donation. As for the GSoC project, the student seems to not get access to the hardware Cavium offered, nor the main mentor (Cc'ed), so there is no feedback about stability/other stuff about those hardware. Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6v_b-veo1ep6nmssxuqxpvyo6yzqb+u7bhtbreb+y...@mail.gmail.com
Re: DSA concerns for jessie architectures (mips*)
On Mon, Jun 24, 2013 at 10:09 PM, Luca Filipozzi lfili...@debian.org wrote: On Mon, Jun 24, 2013 at 05:34:42PM +0800, Aron Xu wrote: On Mon, Jun 24, 2013 at 5:29 PM, Paul Wise p...@debian.org wrote: On Mon, Jun 24, 2013 at 4:51 PM, Peter Palfrader wrote: If our existing eight-year old hardware is the only mips machines we can reasonably get then that doesn't bode well for mips. We don't think relying on the SWARMs (alone) is an option. Perhaps Cavium will interested in providing newer hardware now that there is a MIPS N64 GSoC project underway. They offered some decent hardware last year in association with such a port: http://lists.debian.org/debian-mips/2012/02/msg1.html http://wiki.debian.org/SummerOfCode2013/Projects#MIPS_N32.2FN64_ABI_port http://wiki.debian.org/SummerOfCode2013/StudentApplications/EleanorChen I believe Cavium's David Daney is on debian-mips, we can talk to him to see if there is any possibility of making donation. It would be wonderful to refresh our mips environment as our current mips environment is not healthy. We gladly accept hardware donations but would appreciate if the donated hardware be equivalent to that available commercially. Of the four existing donated boxen that we operate at ubcece, one has never worked (fatally defective) and two are very unreliable. We also had to modify them to boot on power-up. Do the Cavium machines have any remote management features (similar to Sun ALOM, HP iLO, Dell DRAC) that allow access to a serial console and to power management? Alternatively, can they be configured to power on after a power loss so we can attach them to a remotely controlled power distribution unit? Do they boot from local storage? Any help you can provide in securing newer mips equipment is appreciated. We MUST refresh our mips environment if we wish to continue offering a mips port. As mentioned, we will need a number of machines to satisfy the various requirements (geographically distributed buildd machines, accessible porter machine(s), etc.). As for the GSoC project, the student seems to not get access to the hardware Cavium offered, nor the main mentor (Cc'ed), so there is no feedback about stability/other stuff about those hardware. Why were the GSoC students unable to obtain access to the hardware? David once said he has prepared the machine, but we haven't got response from him when asking for shell access. Also, are you interested in asking Lemote for there Loongson 3A machines? Regards, Aron -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4BvXT=yYidQ3BP6Q-a6vJa1_Dsd=jaq9x5wpjctfb...@mail.gmail.com
Bug#690836: partial review of unblock: fcitx/4.2.4.2-1
On Fri, Dec 28, 2012 at 6:26 PM, Paul Gevers elb...@debian.org wrote: Hi, [Resent as my previous mail only went to the bts. Mail-Followup-To set to the bts. Sorry if you are subscribed and already read my original message.] I am touching on this bug as part of the request by the RT [1]. Some remarks: - I suggest explaining in more detail why this version of the package deserves a freeze exception [2]. I don't see any RC or important bugs fixed, or release goals achieved, so I DON'T expect the RT to grant the unblock. This unblock was filed on 18 Oct 2012, at that time freeze wasn't that deep yet. - If I understand correctly, at least, that is how I reproduced it, your code.diff is the difference of the 4.2.4.1-7 versus the 4.2.4.2-1 package with the patches applied, showing only the new code. Right. - I wonder if you could explain in more detail what the changes are about. The changes are not minor (see below) and not easily understandable to an outsider (such as me). See below: $ diffstat code.diff CMakeLists.txt |2 Change the version from 4.2.4.1 to 4.2.4.2 src/frontend/gtk2/fcitximcontext-gio.c | 139 - src/frontend/gtk2/fcitximcontext.c | 134 ++- src/lib/fcitx-gclient/fcitxclient.c| 81 ++- These add some checks about errors as well as some GtkIMContextClass related codes to the input method module, which is loaded as plugin by GTK+. As seen in the diff, many of the changes are add if to handle unexpected situations, others are about adding a new function to handle pre-edit and surrounding in a safer way. These two cases, especially pre-edit, are very important to input method users. Quoting some old GTK documentation[1]: Input Methods provide a way for complex character sets to be used in GTK+. Languages such as Chinese, Japanese, and Korean (often abbreviated to CJK) use a large number of ideographs, making it impossible to support all characters with a simple keyboard. Instead, text is usually pre-edited using a phonetic alphabet and then composed to form the ideographs. In detail, alphabets are passed to the application before the resulting character is committed to it, so that the application can react to user input much earlier, an example is that search engines can use the information to predict what the user is about to find so a list of related candidate can be given before the user completing his typing. [1]http://www.gtk-server.org/gtk1/gdk/gdk-input-methods.html src/module/lua/luawrap.c |2 src/module/xkb/xkb.c |2 These two are just formatting changes, no real content. 6 files changed, 231 insertions(+), 129 deletions(-) Paul [1] https://lists.debian.org/debian-devel-announce/2012/11/msg3.html [ Unblocks and Freeze Policy ] [2] http://release.debian.org/wheezy/freeze_policy.html -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6c3u7fh_fqw1uwymjek-m84yn0fmmkm8y4ssfevk8...@mail.gmail.com
Bug#689425: unblock: fcitx-googlepinyin/0.1.6-1
On Sat, Dec 1, 2012 at 9:18 PM, Julien Cristau jcris...@debian.org wrote: On Tue, Oct 2, 2012 at 21:29:30 +0800, Aron Xu wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock This is a relatively big debdiff, but most of the noise are come from the newly added svg files which show up as text files in diff. These changes are limiting the input and install icons to avoid crashing fcitx main program. Even when known issues in fcitx has already been fixed, it would be good to make fcitx-googlepinyin safer. There's another change in the package which you don't mention here. What is that about? Cheers, Julien I guess you mean the build system related change? It's about changing the configuration format to the up-to-date format used in fcitx 4.2.x branch, the original configuration format is from 4.0.x branch and out-dated. It's a quite easy change as we already have done that for most of other components for quite some time. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6OJjSq=ogc6b+img14hs5mwxj9ebq4-i3byn7uuma...@mail.gmail.com
Bug#694636: unblock: libxml2/2.8.0+dfsg1-7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock libxml2/2.8.0+dfsg1-7, this fixes CVE-2012-5134, that's Bug #694521. -- Regards, Aron Xu diff -Nru libxml2-2.8.0+dfsg1/debian/changelog libxml2-2.8.0+dfsg1/debian/changelog --- libxml2-2.8.0+dfsg1/debian/changelog2012-10-07 14:20:32.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/changelog2012-11-28 22:56:13.0 +0800 @@ -1,3 +1,11 @@ +libxml2 (2.8.0+dfsg1-7) unstable; urgency=low + + [ Daniel Veillard ] + * Fix potential out of bound access +CVE-2012-5134, Closes: #694521. + + -- Aron Xu a...@debian.org Wed, 28 Nov 2012 22:40:13 +0800 + libxml2 (2.8.0+dfsg1-6) unstable; urgency=low [ Daniel Veillard ] diff -Nru libxml2-2.8.0+dfsg1/debian/patches/0006-Fix-potential-out-of-bound-access.patch libxml2-2.8.0+dfsg1/debian/patches/0006-Fix-potential-out-of-bound-access.patch --- libxml2-2.8.0+dfsg1/debian/patches/0006-Fix-potential-out-of-bound-access.patch 1970-01-01 08:00:00.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/patches/0006-Fix-potential-out-of-bound-access.patch 2012-11-28 22:56:13.0 +0800 @@ -0,0 +1,22 @@ +From: Daniel Veillard veill...@redhat.com +Date: Wed, 28 Nov 2012 22:38:50 +0800 +Subject: Fix potential out of bound access + +--- + parser.c |2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/parser.c b/parser.c +index 9863275..e1b0364 100644 +--- a/parser.c b/parser.c +@@ -3932,7 +3932,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { + c = CUR_CHAR(l); + } + if ((in_space) (normalize)) { +-while (buf[len - 1] == 0x20) len--; ++while ((len 0) (buf[len - 1] == 0x20)) len--; + } + buf[len] = 0; + if (RAW == '') { +-- diff -Nru libxml2-2.8.0+dfsg1/debian/patches/series libxml2-2.8.0+dfsg1/debian/patches/series --- libxml2-2.8.0+dfsg1/debian/patches/series 2012-10-07 14:16:14.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/patches/series 2012-11-28 22:56:13.0 +0800 @@ -3,3 +3,4 @@ 0003-Fix-parser-local-buffers-size-problems.patch 0004-Fix-entities-local-buffers-size-problems.patch 0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch +0006-Fix-potential-out-of-bound-access.patch signature.asc Description: Digital signature
Bug#689425: unblock: fcitx-googlepinyin/0.1.6-1
This request is still tagged as moreinfo, do you need even more info for it? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w5eh-ybjpyghb6eedrtqkx_zifo3hmfynsdfs+3bah...@mail.gmail.com
Bug#693014: unblock: ibus-anthy/1.2.7-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock This is a trivial update for #692423, adding python-glade2 to the package's Depends. Without python-glade2 this package isn't useful at all, but it wasn't discovered before as python-glade2 may be easily pulled by other component of a desktop. unblock ibus-anthy/1.2.7-2 diff -Nru ibus-anthy-1.2.7/debian/changelog ibus-anthy-1.2.7/debian/changelog --- ibus-anthy-1.2.7/debian/changelog 2012-08-16 17:33:02.0 +0800 +++ ibus-anthy-1.2.7/debian/changelog 2012-11-12 10:43:46.0 +0800 @@ -1,3 +1,10 @@ +ibus-anthy (1.2.7-2) unstable; urgency=low + + * Team upload. + * Add python-glade2 to Depends. (Closes: #692423) + + -- Aron Xu a...@debian.org Mon, 12 Nov 2012 10:42:32 +0800 + ibus-anthy (1.2.7-1) unstable; urgency=low * New upstream release diff -Nru ibus-anthy-1.2.7/debian/control ibus-anthy-1.2.7/debian/control --- ibus-anthy-1.2.7/debian/control 2011-07-25 21:20:56.0 +0800 +++ ibus-anthy-1.2.7/debian/control 2012-11-12 10:42:30.0 +0800 @@ -15,7 +15,7 @@ Package: ibus-anthy Architecture: any -Depends: ${python:Depends}, ${shlibs:Depends}, ${misc:Depends}, ibus (= 1.2), anthy +Depends: ${python:Depends}, ${shlibs:Depends}, ${misc:Depends}, ibus (= 1.2), anthy, python-glade2 Description: anthy engine for IBus IBus is an Intelligent Input Bus. It is a new input framework for Linux OS. It provides full featured and user friendly input method user interface. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w678wCLP7mjbvz6r=+f9vtz2mh9rxbmau2xbrqi52c...@mail.gmail.com
Bug#691702: unblock: ibus/1.4.1-8
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock ibus/1.4.1-8 which fixes RC bug #691071 as well as a bit more maintenance updates. ibus (1.4.1-8) unstable; urgency=low * dh to call dh_girepository. Closes: #691071 * Removed unused-override unknown-section introspection for lintian. * Add symbols file for libibus-1.0-0. Closes: #691070 * Bump policy to 3.9.3. -- Osamu Aoki os...@debian.org Sun, 21 Oct 2012 22:29:37 +0900 debdiff has been attached. -- Regards, Aron Xu ibus_1.4.1-8.debdiff Description: Binary data
Bug#689425: unblock: fcitx-googlepinyin/0.1.6-1
Hi, On Sun, Oct 14, 2012 at 1:17 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: Control: tags -1 + moreinfo On 02.10.2012 14:29, Aron Xu wrote: This is a relatively big debdiff, but most of the noise are come from the newly added svg files which show up as text files in diff. These changes are limiting the input and install icons to avoid crashing fcitx main program. Even when known issues in fcitx has already been fixed, it would be good to make fcitx-googlepinyin safer. Could you expand on what you mean by limiting the input and install icons, please? limiting the input means limiting how many alphabets a user can input in one shot. Doing such is because there isn't such a check in libgooglepinyin and the upstream of the library won't fix it (it's forked from Google Android), so we have to workaround it by adding the limit in wrapper program. It's reproducible that when a users types many alphabets in a very quick manner (for example, press a key and hold for 60 seconds), the program will crash. Relevant upstream changeset: https://github.com/fcitx/fcitx-googlepinyin/commit/4d92fc61c535b26509ec0fb45f65a57420bc06b9 install icons means adding an icon for this input engine, this is just another workaround of libgooglepinyin. Because of copyright problems we cannot use the original icon from Google, so when being forked the icon was removed. This triggered a bug in some previous versions of fcitx, though the bug is fixed in current version, it's not a bad thing to be safe. This icon is drawn by upstream of fcitx. -- Regards, Aron Xu -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4unzjypnova8xhnwayedy1v2n2rlyfz_rsxcg9rxf...@mail.gmail.com
Bug#689911: unblock: libxml2/2.8.0+dfsg1-6
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package libxml2/2.8.0+dfsg1-6 This version fixes RC bug #676210 by cherry picking an upstream post release commit. diff -Nru libxml2-2.8.0+dfsg1/debian/changelog libxml2-2.8.0+dfsg1/debian/changelog --- libxml2-2.8.0+dfsg1/debian/changelog2012-07-22 20:48:05.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/changelog2012-10-07 14:20:32.0 +0800 @@ -1,3 +1,14 @@ +libxml2 (2.8.0+dfsg1-6) unstable; urgency=low + + [ Daniel Veillard ] + * Fix a failure to report xmlreader parsing failures + Closes: #676210. + + [ Aron Xu ] + * Add gbp.conf for wheezy branch. + + -- Aron Xu a...@debian.org Sun, 07 Oct 2012 14:18:59 +0800 + libxml2 (2.8.0+dfsg1-5) unstable; urgency=low [ Daniel Veillard ] diff -Nru libxml2-2.8.0+dfsg1/debian/gbp.conf libxml2-2.8.0+dfsg1/debian/gbp.conf --- libxml2-2.8.0+dfsg1/debian/gbp.conf 1970-01-01 08:00:00.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/gbp.conf 2012-10-07 14:17:51.0 +0800 @@ -0,0 +1,4 @@ +[DEFAULT] +upstream-branch = upstream +debian-branch = wheezy +upstream-tag = %(version)s diff -Nru libxml2-2.8.0+dfsg1/debian/patches/0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch libxml2-2.8.0+dfsg1/debian/patches/0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch --- libxml2-2.8.0+dfsg1/debian/patches/0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch 1970-01-01 08:00:00.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/patches/0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch 2012-10-07 14:16:14.0 +0800 @@ -0,0 +1,29 @@ +From: Daniel Veillard veill...@redhat.com +Date: Wed, 18 Jul 2012 17:39:56 +0800 +Subject: Fix a failure to report xmlreader parsing failures + +Related to https://bugzilla.gnome.org/show_bug.cgi?id=654567 +the problem is that the provided patch failed to raise an error +on xmlTextReaderRead() return when an actual parsing error occured +--- + xmlreader.c |5 - + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/xmlreader.c b/xmlreader.c +index 77ac71b..10417ee 100644 +--- a/xmlreader.c b/xmlreader.c +@@ -907,8 +907,11 @@ xmlTextReaderPushData(xmlTextReaderPtr reader) { + } + } + reader-state = oldstate; +-if (reader-ctxt-wellFormed == 0) ++if (reader-ctxt-wellFormed == 0) { + reader-mode = XML_TEXTREADER_MODE_EOF; ++return(-1); ++} ++ + return(0); + } + +-- diff -Nru libxml2-2.8.0+dfsg1/debian/patches/series libxml2-2.8.0+dfsg1/debian/patches/series --- libxml2-2.8.0+dfsg1/debian/patches/series 2012-07-22 20:48:05.0 +0800 +++ libxml2-2.8.0+dfsg1/debian/patches/series 2012-10-07 14:16:14.0 +0800 @@ -2,3 +2,4 @@ 0002-modify-xml2-config-and-pkgconfig-behaviour.patch 0003-Fix-parser-local-buffers-size-problems.patch 0004-Fix-entities-local-buffers-size-problems.patch +0005-Fix-a-failure-to-report-xmlreader-parsing-failures.patch -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w41ARpKaGJuq_a3=1dvnvb7mjudqtbcahzy9in0nb8...@mail.gmail.com
Bug#689425: unblock: fcitx-googlepinyin/0.1.6-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock This is a relatively big debdiff, but most of the noise are come from the newly added svg files which show up as text files in diff. These changes are limiting the input and install icons to avoid crashing fcitx main program. Even when known issues in fcitx has already been fixed, it would be good to make fcitx-googlepinyin safer. unblock: fcitx-googlepinyin/0.1.6-1 -- Regards, Aron Xu fcitx-googlepinyin_0.1.6-1.debdiff Description: Binary data
Bug#688887: unblock: fcitx/1:4.2.4.1-7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock This is the follow up improvement of the fix intended for RC bug #684245. This patch avoids all situations that may be encountered to trigger the bug in gnumeric, fix for that bug has been submitted and applied to gnumeric upstream repository. More information can be found at http://bugs.debian.org/687729 and https://bugzilla.gnome.org/show_bug.cgi?id=684511 unblock: fcitx/1:4.2.4.1-7 diff -Nru fcitx-4.2.4.1/debian/changelog fcitx-4.2.4.1/debian/changelog --- fcitx-4.2.4.1/debian/changelog 2012-09-15 19:51:00.0 + +++ fcitx-4.2.4.1/debian/changelog 2012-09-26 16:23:05.0 + @@ -1,3 +1,10 @@ +fcitx (1:4.2.4.1-7) unstable; urgency=low + + * improve 0009-gnumeric_cursor_keys_edit.patch to fix bug +completely. + + -- YunQiang Su wzss...@gmail.com Wed, 26 Sep 2012 22:08:29 +0800 + fcitx (1:4.2.4.1-6) unstable; urgency=low * add gbp.conf for wheezy diff -Nru fcitx-4.2.4.1/debian/patches/0009-gnumeric_cursor_keys_edit.patch fcitx-4.2.4.1/debian/patches/0009-gnumeric_cursor_keys_edit.patch --- fcitx-4.2.4.1/debian/patches/0009-gnumeric_cursor_keys_edit.patch 2012-09-15 18:40:35.0 + +++ fcitx-4.2.4.1/debian/patches/0009-gnumeric_cursor_keys_edit.patch 2012-09-26 16:23:05.0 + @@ -1,8 +1,8 @@ -diff --git a/src/frontend/ipc/ipc.c b/src/frontend/ipc/ipc.c -index 1d57567..67261fe 100644 a/src/frontend/ipc/ipc.c -+++ b/src/frontend/ipc/ipc.c -@@ -43,6 +43,7 @@ typedef struct _FcitxIPCIC { +Index: fcitx/src/frontend/ipc/ipc.c +=== +--- fcitx.orig/src/frontend/ipc/ipc.c 2012-09-26 22:01:16.354865405 +0800 fcitx/src/frontend/ipc/ipc.c 2012-09-26 22:02:26.979215609 +0800 +@@ -43,6 +43,7 @@ char* surroundingText; unsigned int anchor; unsigned int cursor; @@ -10,7 +10,7 @@ } FcitxIPCIC; typedef struct _FcitxIPCFrontend { -@@ -349,6 +350,7 @@ void IPCCreateIC(void* arg, FcitxInputContext* context, void* priv) +@@ -349,6 +350,7 @@ ipcic-id = ipc-maxid; ipc-maxid ++; @@ -18,7 +18,7 @@ sprintf(ipcic-path, FCITX_IC_DBUS_PATH, ipcic-id); uint32_t arg1, arg2, arg3, arg4; -@@ -930,6 +932,23 @@ static void IPCICSetCursorRect(FcitxIPCFrontend* ipc, FcitxInputContext* ic, int +@@ -930,6 +932,23 @@ void IPCUpdatePreedit(void* arg, FcitxInputContext* ic) { @@ -42,3 +42,56 @@ if (ic-contextCaps CAPACITY_FORMATTED_PREEDIT) { FcitxIPCFrontend* ipc = (FcitxIPCFrontend*) arg; dbus_uint32_t serial = 0; // unique number to associate replies with requests +Index: fcitx/data/script/fcitx-configtool +=== +--- fcitx.orig/data/script/fcitx-configtool2012-09-26 22:01:57.235068121 +0800 fcitx/data/script/fcitx-configtool 2012-09-26 22:03:16.283460099 +0800 +@@ -32,7 +32,7 @@ + exec $command kcm_fcitx + fi + else +-run_gtk $1 ++run_gtk3 $1 + fi + } + +Index: fcitx/src/frontend/gtk2/fcitximcontext.c +=== +--- fcitx.orig/src/frontend/gtk2/fcitximcontext.c 2012-09-26 22:01:57.235068121 +0800 fcitx/src/frontend/gtk2/fcitximcontext.c 2012-09-26 22:03:16.287460117 +0800 +@@ -465,7 +465,7 @@ + + /* set_cursor_location_internal() will get origin from X server, + * it blocks UI. So delay it to idle callback. */ +-g_idle_add_full(G_PRIORITY_DEFAULT_IDLE, ++gdk_threads_add_idle_full(G_PRIORITY_DEFAULT_IDLE, + (GSourceFunc) _set_cursor_location_internal, + g_object_ref(fcitxcontext), + (GDestroyNotify) g_object_unref); +@@ -584,8 +584,6 @@ + /* do nothing */ + } + } +- +-g_signal_emit(context, _signal_preedit_changed_id, 0); + } + + static void +@@ -695,8 +693,6 @@ + /* do nothing */ + } + } +- +-g_signal_emit(context, _signal_preedit_changed_id, 0); + } + + /// +@@ -727,7 +723,7 @@ + + /* set_cursor_location_internal() will get origin from X server, + * it blocks UI. So delay it to idle callback. */ +-g_idle_add_full(G_PRIORITY_DEFAULT_IDLE, ++gdk_threads_add_idle_full(G_PRIORITY_DEFAULT_IDLE, + (GSourceFunc) _set_cursor_location_internal, + g_object_ref(fcitxcontext), + (GDestroyNotify) g_object_unref); -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w5tB7-H=ea_1eE_n-O=3mgzb7lf8++t2d+3smwaxks...@mail.gmail.com
Bug#688653: unblock: fcitx-m17n/0.1.2-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock This fixes Bug #688011. Even though most Pinyin users does not use fcitx-m17n everyday, there are people who are using it because they are learning to input Chinese, or they don't have access to install software. This fix is an important one to complete fcitx-m17n's functionality as its name suggested. diff -Nru fcitx-m17n-0.1.2/debian/changelog fcitx-m17n-0.1.2/debian/changelog --- fcitx-m17n-0.1.2/debian/changelog 2012-05-15 16:37:49.0 +0800 +++ fcitx-m17n-0.1.2/debian/changelog 2012-09-24 22:45:28.0 +0800 @@ -1,3 +1,9 @@ +fcitx-m17n (0.1.2-2) unstable; urgency=low + + * Fix pinyin input window (Closes: #688011). + + -- Aron Xu a...@debian.org Mon, 24 Sep 2012 22:42:54 +0800 + fcitx-m17n (0.1.2-1) unstable; urgency=low * New upstream release. diff -Nru fcitx-m17n-0.1.2/debian/patches/0001-fix-debian-bug-688011.patch fcitx-m17n-0.1.2/debian/patches/0001-fix-debian-bug-688011.patch --- fcitx-m17n-0.1.2/debian/patches/0001-fix-debian-bug-688011.patch 1970-01-01 08:00:00.0 +0800 +++ fcitx-m17n-0.1.2/debian/patches/0001-fix-debian-bug-688011.patch 2012-09-24 22:45:28.0 +0800 @@ -0,0 +1,36 @@ +From: Weng Xuetian wen...@gmail.com +Date: Sun, 23 Sep 2012 21:44:40 -0400 +Subject: fix debian bug #688011 + +--- + im/fcitx-m17n.c |4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/im/fcitx-m17n.c b/im/fcitx-m17n.c +index bc9a938..c404ddd 100644 +--- a/im/fcitx-m17n.c b/im/fcitx-m17n.c +@@ -324,6 +324,7 @@ MSymbol KeySymToSymbol (FcitxKeySym sym, unsigned int state) + } + + const char* base = ; ++char temp[2] = ; + + if (sym = FcitxKey_space sym = FcitxKey_asciitilde) { + FcitxKeySym c = sym; +@@ -337,7 +338,6 @@ MSymbol KeySymToSymbol (FcitxKeySym sym, unsigned int state) + mask |= FcitxKeyState_Ctrl; + } + +-char temp[2] = ; + temp[0] = c 0xff; + base = temp; + } +@@ -714,4 +714,4 @@ FcitxM17NCallback (MInputContext *context, + else if (len 0) + FcitxInstanceDeleteSurroundingText (im-owner-owner, ic, 0, -len); + } +-} +\ No newline at end of file ++} +-- diff -Nru fcitx-m17n-0.1.2/debian/patches/series fcitx-m17n-0.1.2/debian/patches/series --- fcitx-m17n-0.1.2/debian/patches/series 1970-01-01 08:00:00.0 +0800 +++ fcitx-m17n-0.1.2/debian/patches/series 2012-09-24 22:45:28.0 +0800 @@ -0,0 +1 @@ +0001-fix-debian-bug-688011.patch -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w72eU79fSu118EXWzEen9sO5A1ViKM5Yn1bfQM=bmw...@mail.gmail.com
Bug#685867: unblock: im-config/0.18
As the proposer of such a change, I fully support this unblock request as it is very important for users who don't have a _very_ fast machine. Input method frameworks can wait for D-Bus for a give amount of time, but it is definitely not an optimal solution to increase this time again and again, as there aren't so many people who have been using SSD to boost the loading of there desktop environment and there are examples who are using slow machines and suffer from the very issue just around me. We have been testing this patch since it has been written with our daily use, and it appears to be good enough: solve the problem reliably and haven't caused any problem so far. We have been providing decent input support in Debian for quite some time, this change can make it even better. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/503f7d49.8030...@gmail.com
Bug#684910: unblock: fcitx/1:4.2.4.1-5
Hi, My co-maintainer has uploaded a new version to unstable, which adds the Breaks entries based on -4, could you please have a look at it? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w7v3lb84wyjry66obzcixsktiy-ad8osulwyt5oiw_...@mail.gmail.com
Bug#683753: unblock: ns3/3.14.1+dfsg-1
Hi, On Sat, Aug 18, 2012 at 3:56 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On Fri, 2012-08-03 at 22:52 +0800, Aron Xu wrote: Please unblock ns3 as it was uploaded before freeze but blocked by an already-fixed RC bug. Out-dated binaries were removed by ftp team, and the false RC-bug has been marked as fixed manually and I think it is a good candidate to be included in Wheezy. The package hasn't been in testing for the best part of a year now. I'm not immediately convinced that re-adding it during the freeze is particularly beneficial. Actually it stuck for 2 months because of the reasons stated in my first email: Please unblock ns3 as it was uploaded before freeze but blocked by an already-fixed RC bug. Out-dated binaries were removed by ftp team, and the false RC-bug has been marked as fixed manually and I think it is a good candidate to be included in Wheezy. The bug mentioned is #673623 and the out-dated binaries are removed by asking ftp-masters on IRC. I still think it's in good shape to fit into Wheezy, would you mind to have a second look? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4QD_MOBfqrTNBobestiQno8S=yCSJ3uew+BWJB=24...@mail.gmail.com
Bug#684910: unblock: fcitx/1:4.2.4.1-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock fcitx/1:4.2.4.1-4. This version fixes a crash when loading input method wrappers that does not specify an icon of it. Also we are moving the keyboard module (fcitx-keyboard.so) from fcitx-module-x11 to the general fcitx-modules as it does provide some useful features when there is no X, as fcitx-module-x11 depends on fcitx-modules, such move would not cause breakage. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w7rulvsqn2zxdttyt1by2zhkypgosdw65qenimxdqm...@mail.gmail.com
Re: unblock request for fcitx
On Sun, Jul 22, 2012 at 1:56 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On Mon, 2012-07-16 at 23:51 +0800, Aron Xu wrote: debdiff attached. There is a rename of a patch which I hope it does not hurt, I just want to keep them in consistent... Well, it makes the review process somewhat more annoying, as one has to confirm that the content of the patch has not changed. It also fits the definition of changes to the package which are not related to fixing the bugs in question. Please go ahead. Reminder: please unblock the package as it has been sit in unstable for 7 days (need 10 days). Thanks! -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6_ySdMffXWAoJsd+qjPXd5MaK_N5SM-Ve6B=cmhdy...@mail.gmail.com
Bug#683753: unblock: ns3/3.14.1+dfsg-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock ns3 as it was uploaded before freeze but blocked by an already-fixed RC bug. Out-dated binaries were removed by ftp team, and the false RC-bug has been marked as fixed manually and I think it is a good candidate to be included in Wheezy. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6k+kpgei+xkulsmcpnxehzsqftdqhg0wlpzkpg7xh...@mail.gmail.com
Re: Please unblock: lua5.1/5.1.5-4
On Thu, Jul 26, 2012 at 4:24 PM, Julien Cristau jcris...@debian.org wrote: On Thu, Jul 26, 2012 at 16:21:10 +0800, Aron Xu wrote: On Thu, Jul 26, 2012 at 4:15 PM, Julien Cristau jcris...@debian.org wrote: On Thu, Jul 26, 2012 at 16:03:46 +0800, Aron Xu wrote: I'd like to see lua5.1/5.1.5-4 can be unblocked so I can upload fcitx to unstable, which depends on lua5.1 and has already been pre-granted an unblock. I don't see the connection. I have not tested whether building against Multiarched version of lua5.1 will affect the usability of fcitx (theoretically won't), but I think to be safe I will wait for it if an unblock can be granted to lua5.1. Sounds like something that should be tested in any case? And if it *does* impact fcitx then that would be a reason to *not* unblock lua5.1. I have tested it and the package works, I'll upload fcitx very soon. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4wn54Vu1=k2ifzq+f1ek41qxsafnnpmwxb+d+fiun...@mail.gmail.com
Re: Please unblock: lua5.1/5.1.5-4
Hi, As I've already replied to #682183, I've done a full rebuild of the reverse dependencies of lua5.1/5.1.5-4 and all of the builds have no regressions found. Build logs can be found at: http://people.debian.org/~aron/rebuild/lua5.1/20120723/ I'd like to see lua5.1/5.1.5-4 can be unblocked so I can upload fcitx to unstable, which depends on lua5.1 and has already been pre-granted an unblock. -- Regards, Aron Xu signature.asc Description: This is a digitally signed message part.
Re: Please unblock: lua5.1/5.1.5-4
On Thu, Jul 26, 2012 at 4:15 PM, Julien Cristau jcris...@debian.org wrote: On Thu, Jul 26, 2012 at 16:03:46 +0800, Aron Xu wrote: I'd like to see lua5.1/5.1.5-4 can be unblocked so I can upload fcitx to unstable, which depends on lua5.1 and has already been pre-granted an unblock. I don't see the connection. Cheers, Julien I have not tested whether building against Multiarched version of lua5.1 will affect the usability of fcitx (theoretically won't), but I think to be safe I will wait for it if an unblock can be granted to lua5.1. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4f0BSMD2Dpufok=4YJOmtg32Uy7aWebWy=fptyhat...@mail.gmail.com
Bug#682402: unblock: libxml2/2.8.0+dfsg1-5
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock libxml2/2.8.0+dfsg1-5 which fixes CVE-2012-2807, Bug #679280. Fix for squeeze has been agreed by security team and uploaded to security-master just now. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w5__t+9snstni-vlghffg3pph-uwzqog5vjvop1q5h...@mail.gmail.com
Bug#682230: unblock: glipper/2.3-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock glipper/2.3-3 for an important bug fix recorded at Launchpad: https://bugs.launchpad.net/glipper/+bug/904367 Without the patch glipper will crash under certain circumstance. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w77vrnXUkSwq02EYnAa3n2=yfar+clc729dhzzxxjt...@mail.gmail.com
Bug#682268: unblock: foremost/1.5.7-4
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock the package foremost. The updated version fixed the build on kfreebsd-* (1.5.7-3) and hurd (1.5.7-4). It would be great to have one more software ported to those platform by making simple build system changes. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w5dty+hy_kqypp5rkuqh4x2_hmymv1dbtl0r9sda-h...@mail.gmail.com
Re: unblock request for fcitx
On Fri, Jul 13, 2012 at 12:41 AM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On 12.07.2012 11:24, Aron Xu wrote: I would like to upload an update of fcitx to unstable, applying several of upstream stable branch patches, changes are committed to git: http://anonscm.debian.org/gitweb/?p=pkg-ime/fcitx.git;a=commitdiff;h=7da4de754cafa4c683ba74ebe43e152493369787 Please could we have a full debdiff between the source package currently in testing and the new package you're proposing to upload to unstable? From the above URL, renaming patches as part of an unblock request is also not particularly helpful for review purposes. :( debdiff attached. There is a rename of a patch which I hope it does not hurt, I just want to keep them in consistent... -- Regards, Aron Xu fcitx_4.2.4.1-3.debdiff Description: Binary data
unblock request for fcitx
Hi, I would like to upload an update of fcitx to unstable, applying several of upstream stable branch patches, changes are committed to git: http://anonscm.debian.org/gitweb/?p=pkg-ime/fcitx.git;a=commitdiff;h=7da4de754cafa4c683ba74ebe43e152493369787 Several bugs have been fixed in this version, this includes Debian Bug #681070, #681071 and several important issues found by code review (mostly about causing crashes under certain conditions). Please comment if I can upload this version to unstable, thanks! -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6SZn8uVP=1r3xaUDyL4w_W-X6Zu8SdVpFmPW=nl7d...@mail.gmail.com
Please unblock ttf-wqy-microhei/0.2.0-beta-1.1
Hi, Could you please unblock ttf-wqy-microhei/0.2.0-beta-1.1? In this version we've got x-ttcidfont-conf removed, effectively avoids defoma for ordinary users who install Recommends by default. Also the maintainer scripts are removed to avoid possible breakage when configuring the package. I've added the maintainer Zhengpeng to CC, who has acked this NMU prior to my upload. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w7j411-umysren-u37qn0xudx9phhb0bhkjtagfvv7...@mail.gmail.com
Bug#680703: unblock: qpdfview/0.3.1-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock qpdfview/0.3.1-1, which is the first upstream stable release in Debian. Previous uploads are beta, and unfortunately upstream haven't made the final release in time of the freeze. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6qVKGCHmxS=zhk0lssqq-q-zfbg2pg6vtfx2gahmb...@mail.gmail.com
Bug#680490: pu: package libxslt/1.1.26-6+squeeze1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: pu Dear release team, I'd like to upload an update version of libxslt to squeeze in order to fix three CVEs: - CVE-2011-1202, Bug #617413. - CVE-2011-3970, Bug #660650. - CVE-2012-2825, Bug #679283. debdiff is attached. Wish those config.sub and config.guess stuff doesn't hurt. Thanks for considering. -- Regards, Aron Xu libxslt_1.1.26-6+squeeze1.debdiff Description: Binary data
unblock and pu request for libxslt
Hi, Can you please unblock libxslt/1.1.26-13 which fixes CVE-2012-2825 (Bug #679283)? Patch applied: http://anonscm.debian.org/gitweb/?p=debian-xml-sgml/libxslt.git;a=blob;f=debian/patches/0005-cve-2012-2825.patch;h=2e7db481530519ed82a69ab41e4297767f83e6f5;hb=ecbb4ca70e90c1c4789049e7a41c6c1d2c51871e I've also prepared an update for squeeze and please advise if I can upload to pu. This fixes three CVEs: CVE-2011-1202, #617413: http://anonscm.debian.org/gitweb/?p=debian-xml-sgml/libxslt.git;a=commitdiff;h=dbb14e5be43bf20c8b7a2e37bda1d8f7867dc56b;hp=1a30e3c16a7b08489fec5dde9808dfbd15f9cd4b CVE-2011-3970, #660650: http://anonscm.debian.org/gitweb/?p=debian-xml-sgml/libxslt.git;a=commitdiff;h=18dd5c48fc1829ec75823b5ac975574b785c1233;hp=dbb14e5be43bf20c8b7a2e37bda1d8f7867dc56b CVE-2012-2825, #679283: http://anonscm.debian.org/gitweb/?p=debian-xml-sgml/libxslt.git;a=commitdiff;h=9ebc17a3bad5fc6807080e11bcca3f58c8c392fe;hp=18dd5c48fc1829ec75823b5ac975574b785c1233 -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w79nN3rKC-sr7DYFEUV3GBucbO5N0GzvUeE=lm_cgf...@mail.gmail.com
Re: unblock and pu request for libxslt
On Thu, Jul 5, 2012 at 6:21 PM, Adam D. Barratt a...@adam-barratt.org.uk wrote: On 05.07.2012 11:00, Aron Xu wrote: Can you please unblock libxslt/1.1.26-13 which fixes CVE-2012-2825 (Bug #679283)? Patch applied: http://anonscm.debian.org/gitweb/?p=debian-xml-sgml/libxslt.git;a=blob;f=debian/patches/0005-cve-2012-2825.patch;h=2e7db481530519ed82a69ab41e4297767f83e6f5;hb=ecbb4ca70e90c1c4789049e7a41c6c1d2c51871e This is fun: --- libxslt-1.1.26/debian/changelog 2012-06-15 11:04:15.0 + +++ libxslt-1.1.26/debian/changelog 2012-07-05 03:10:22.0 + @@ -1,9 +1,8 @@ -libxslt (1.1.26-12+rebuild1) unstable; urgency=low +libxslt (1.1.26-13) unstable; urgency=low - * Rebuild against new libxml2 to make xslt-config identical across -architectures. + * Patch to fix CVE-2012-2825 (Closes: #679283). - -- Aron Xu a...@debian.org Fri, 15 Jun 2012 18:55:36 +0800 + -- Aron Xu a...@debian.org Thu, 05 Jul 2012 11:09:19 +0800 Unblocked anyway. Thanks for unblocking, but no fun at all. changelog for sourceful rebuild is useless for history tracking anyway. I've also prepared an update for squeeze and please advise if I can upload to pu. This fixes three CVEs: Please don't mix different types of request in the same mail. For a stable update, please open an appropriately usertagged pu bug, including a full source debdiff rather than VCS pointers. Regards, Adam OK, will do, thanks! -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4nBB38kqaQ_MjjXLA=64jwdamx_argcesgkfvcegk...@mail.gmail.com
Re: [xml/sgml-pkgs] Bug#676686: libxslt1.1: libxslt1.1 binNMU broke multi-arch installability
Hi, The problem here is that `xml2-config --libs`'s output isn't identical across different architectures, especially differ from Linux to other platforms. On Linux, normally only -lxml2 will be the output, but -L{libdir} -lxml2 on others. I'm thinking about fixing libxml2 now, and will upload a proper fix very soon. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6lz38-gjanrwjspkskuoutrgvbo_a4mx70qetkghq...@mail.gmail.com
Re: [xml/sgml-pkgs] Bug#676686: libxslt1.1: libxslt1.1 binNMU broke multi-arch installability
Hi list, It seems M-A:same packages are not binNMU safe, even when requested on all archs because every arch uses its own copy of debian/changelog item. Does this mean M-A:same packages should be prevented from being binNMUed, but only source upload can be accepted? On Sat, Jun 9, 2012 at 4:24 AM, Aron Xu happyaron...@gmail.com wrote: severity 676686 serious thanks On Sat, Jun 9, 2012 at 6:07 AM, Ralf Jung p...@ralfj.de wrote: Package: libxslt1.1 Version: 1.1.26-12+b1 Severity: important Dear Maintainer, libxslt1.1 can no longer be installed in several architectures at once. Installation shows the following error: dpkg: error processing /var/cache/apt/archives/libxslt1.1_1.1.26-12+b1_i386.deb (--unpack): trying to overwrite shared '/usr/share/doc/libxslt1.1/changelog.Debian.gz', which is different from other instances of package libxslt1.1:i386 True, but seems to be a problem for other paties involved to M-A, for example the buildd binNMU and dpkg handling. I'll clone this bug for them. For libxslt, I'll make an upload soon when I come back - roughly after 12th, to try to fix libxslt-dev's M-A situation and solve this one together, but I'm afraid you need to wait till then. I'm raising the severity to RC to prevent it migrate to testing until getting dealt with. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w63_9za3m1h726xeofbknydhythd+xkofvb_c1+q77...@mail.gmail.com
Re: [xml/sgml-pkgs] Bug#676686: libxslt1.1: libxslt1.1 binNMU broke multi-arch installability
On Sat, Jun 9, 2012 at 6:17 AM, Philipp Kern pk...@debian.org wrote: On Sat, Jun 09, 2012 at 04:36:40AM +0800, Aron Xu wrote: Does this mean M-A:same packages should be prevented from being binNMUed, but only source upload can be accepted? You cannot deprive the Release Team of this tool. Also multiarch bugs are IMHO at most important, not serious. Possibly we could allow one last sourceful upload when the transitions all settled, but it would again increase the review load on the release team. OK, I get your point, and I never meant not to binNMU is a reasonable idea. The reason for RC severity is just to prevent the version from migrating to testing before I've sorted out the M-A mess as much as possible on my side - for example #671902. Also, there is no important user-sensible changes (package maintainers and users) in this version, but mostly improvements to maintainability. IMHO it's on the if it works, fine, if not, sorry about that part of the list, given that it was finalized so late, with that critical piece missing. Sure, I'll get the final version into archive before freeze, regardless whether there are remaining odd bits of M-A as long as they aren't affecting normal users. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4f6buu_jvruta8d9d1m0tcnmkonub3qsh4f4v-mlv...@mail.gmail.com
Re: [xml/sgml-pkgs] Bug#676686: libxslt1.1: libxslt1.1 binNMU broke multi-arch installability
On Sat, Jun 9, 2012 at 8:30 AM, Henrique de Moraes Holschuh h...@debian.org wrote: On Sat, 09 Jun 2012, Philipp Kern wrote: On Sat, Jun 09, 2012 at 04:36:40AM +0800, Aron Xu wrote: Does this mean M-A:same packages should be prevented from being binNMUed, but only source upload can be accepted? You cannot deprive the Release Team of this tool. Also multiarch bugs are IMHO Indeed, we cannot. But there has never been a need to, anyway. We'd just have to teach the tool to binNMU all arches when the target package would need it due to multiarch. Release team requests a binNMU of a package for some arch, the tool notices it has to do them all because of multi-arch constraints, and replicates the request for all other arches. This is even listed in Ubuntu's MultiarchSpec wiki package... Yes, but things are a little bit different here. I did request binNMUs of all archs, but unfortunately buildds of every architecture generates a unique changelog entry saying the NMU is done by ${arch} architecture buildd admin, and you already know what would happen, :) -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w6LoQHqjaBXb-V0z_-_4K=ZbE7MEVA8Yp9SZQ½rr...@mail.gmail.com
Bug#676191: nmu: libxslt_1.1.26-12
Package: release.debian.org Severity: important User: release.debian@packages.debian.org Usertags: binnmu Hello, libxslt_1.1.26-12 has included odd dependency in xslt-config and its pkg-config files. The reason is the package has been built against a version of libxml2 that exports those dependencies in xml2-config (#675682). As libxml2_2.8.0+dfsg1-3 has been in unstable and fixed the bug, a rebuild of libxslt will resolve the problem here. nmu libxslt_1.1.26-12 . ALL . -m'Rebuild to eliminate problematic dependency (Closes #675793)' -- Regards, Aron Xu signature.asc Description: Digital signature
Re: Proposed update for ecl package
On Sun, Mar 25, 2012 at 01:02, Adam D. Barratt a...@adam-barratt.org.uk wrote: On Sat, 2012-02-04 at 01:49 +0800, Aron Xu wrote: I would like to propose following changes for ecl package in Squeeze, please have a look at the attached debdiff. Apologies for the delay in getting back to you on this. +ecl (9.6.1-1squeeze2) stable; urgency=low + + * Team upload for stable release update. + * debian/postrm: removed. + We introduced this scripted when using clc, but since it's gone + since Squeeze, the script will remove /usr/bin/ecl during + upgrade, renders the package not usable for any user upgrading + from older version. (Closes: #613484). Assuming that this has been successfully upgraded tested (at least from the current squeeze package; from lenny would be good but possibly a little more difficult to do), please go ahead with the upload. Regards, Adam Uploaded, thanks. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w7wntu4W3-+Tr1rwdtMWpK2hA=v2yu4bbujeyi6nmb...@mail.gmail.com
Bug#659304: nmu: abiword_2.9.2+svn20120123-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hi, Can you please schedule a binNMU of abiword, to make sure they can pick up the correct dependency of libwv-1.2-4? nmu abiword_2.9.2+svn20120123-1 . ALL . -m rebuild against libwv-dev = 1.2.9-1 -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAMr=8w4njwqfsten4uza9ssbyol9qjurt_0wkb4cs758fa2...@mail.gmail.com
Proposed update for ecl package
[Please CC, not subscribed to debian-release.] Hi, I would like to propose following changes for ecl package in Squeeze, please have a look at the attached debdiff. -- Regards, Aron Xu diff -u ecl-9.6.1/debian/changelog ecl-9.6.1/debian/changelog --- ecl-9.6.1/debian/changelog +++ ecl-9.6.1/debian/changelog @@ -1,3 +1,14 @@ +ecl (9.6.1-1squeeze2) stable; urgency=low + + * Team upload for stable release update. + * debian/postrm: removed. +We introduced this scripted when using clc, but since it's gone +since Squeeze, the script will remove /usr/bin/ecl during +upgrade, renders the package not usable for any user upgrading +from older version. (Closes: #613484). + + -- Aron Xu a...@debian.org Sat, 04 Feb 2012 01:34:41 +0800 + ecl (9.6.1-1squeeze1) testing; urgency=low * Non-maintainer upload. reverted: --- ecl-9.6.1/debian/postrm +++ ecl-9.6.1.orig/debian/postrm @@ -1,36 +0,0 @@ -#! /bin/sh -# postrm script for series -# -# see: dh_installdeb(1) - -set -e - -# summary of how this script can be called: -#* postrm `remove' -#* postrm `purge' -#* old-postrm `upgrade' new-version -#* new-postrm `failed-upgrade' old-version -#* new-postrm `abort-install' -#* new-postrm `abort-install' old-version -#* new-postrm `abort-upgrade' old-version -#* disappearer's-postrm `disappear' roverwritr new-version -# for details, see /usr/share/doc/packaging-manual/ - -case $1 in - purge|remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear) -rm /usr/bin/ecl 2 /dev/null || true -rm /usr/lib/ecl/*.o 2 /dev/null || true -;; - -*) -echo postrm called with unknown argument \`$1' 2 -exit 0 - -esac - -# dh_installdeb will replace this with shell code automatically -# generated by other debhelper scripts. - -#DEBHELPER# - - signature.asc Description: Digital signature
Re: [SRM] Stable update for gwrite
On 2011年05月31日 14:03, Raphael Hertzog wrote: Hi, On Tue, 31 May 2011, Aron Xu wrote: Hi, I'd like to propose the following change for gwrite (as attached debdiff). The patch doesn't look right: man dh_pythonsupport [...] Appropriate dependencies on python-support, python and pythonX.Y are put in ${python:Depends}. The ${python:Versions} and ${python:Provides} optional substitution variables are made available as well. Cheers, Sorry but my pbuilder produced a false result for using ${python:Versions}, which didn't add the correct python-support entry in Depends. Maybe I did something wrong that time and I'll prepare it again now. PS: I've already used ${python:Depends} substitution variable to fix this problem in the version in Sid. -- Regards, Aron Xu signature.asc Description: OpenPGP digital signature
Re: [SRM] Stable update for gwrite
On 2011年05月31日 18:16, Philipp Kern wrote: On Tue, May 31, 2011 at 07:49:07AM +0800, Aron Xu wrote: I'd like to propose the following change for gwrite (as attached debdiff). Sorry, but no. All this is out of scope for stable. (Also: unless there's a RC bug because of them lintian errors do not qualify.) Kind regards Philipp Kern So this means missing Depends (python-support) does not worth an update? -- Regards, Aron Xu signature.asc Description: OpenPGP digital signature
[SRM] Stable update for gwrite
Hi, I'd like to propose the following change for gwrite (as attached debdiff). -- Regards, Aron Xu diff -u gwrite-0.3.0/debian/changelog gwrite-0.3.0/debian/changelog --- gwrite-0.3.0/debian/changelog +++ gwrite-0.3.0/debian/changelog @@ -1,3 +1,14 @@ +gwrite (0.3.0-2) stable; urgency=low + + * debian/control: +- Change to @debian.org address. +- Add python-support (= 0.90) to Depends to avoid missing + python-support (E: missing-dependency-on-python-support). + * debian/dirs: +- Removed, uselessly installed empty directory /usr/sbin. + + -- Aron Xu a...@debian.org Tue, 31 May 2011 07:22:41 +0800 + gwrite (0.3.0-1) unstable; urgency=low * New upstream release: diff -u gwrite-0.3.0/debian/control gwrite-0.3.0/debian/control --- gwrite-0.3.0/debian/control +++ gwrite-0.3.0/debian/control @@ -1,14 +1,14 @@ Source: gwrite Section: editors Priority: optional -Maintainer: Aron Xu happyaron...@gmail.com +Maintainer: Aron Xu a...@debian.org Build-Depends: cdbs, debhelper (= 7), python, python-support, python-setuptools, python-distutils-extra Standards-Version: 3.8.4 Homepage: http://code.google.com/p/gwrite Package: gwrite Architecture: all -Depends: ${shlibs:Depends}, ${misc:Depends}, python, python-gtk2, python-jswebkit, python-webkit, mimetex, wv +Depends: ${shlibs:Depends}, ${misc:Depends}, python, python-gtk2, python-jswebkit, python-webkit, mimetex, wv, python-support (= 0.90) Description: simple GTK+ HTML5 rich text editor gWrite is a simple GTK+ HTML5 WYSIWYG editor, focusing on writing and simple text formating. It can automatically generate a table of reverted: --- gwrite-0.3.0/debian/dirs +++ gwrite-0.3.0.orig/debian/dirs @@ -1,2 +0,0 @@ -usr/bin -usr/sbin signature.asc Description: Digital signature
Bug#603570: Bug #603570: RM: fcitx/testing -- ROM; not dfsg free
1:3.6.4-1 has been in unstable now, and it fixed the legal issue, should we convert this RM request to an unblock request? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/aanlktikcpzn3vb+fkppu=husj62mmr7dvxvos9w8b...@mail.gmail.com
Bug#603570: Bug #603570: RM: fcitx/testing -- ROM; not dfsg free
Well the real problem is a textual data file has a legal problem, and the program itself does not have changes. My question is, is it possible to introduce 3.6.4 to testing now? -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/aanlktikuab8fkjexnn_c0imcx8qsxgnoyb3xuujec...@mail.gmail.com
Bug#603479: unblock: pygccxml/1.0.0-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock source package pygccxml/1.0.0-4. This version of pygccxml fixes the important runtime error on kfreebsd-* archs (Bug #588844) which make it doesn't work at all; it also use hashlib instead of md5 module when Python = 2.6 is available. unblock pygccxml/1.0.0-4 -- Regards, Aron Xu signature.asc Description: Digital signature