diff options
-rw-r--r-- | debian/changelog | 4 | ||||
-rw-r--r-- | debian/patches/0105-typo.patch | 217 | ||||
-rw-r--r-- | debian/patches/0605-manpage_typo.patch | 27 | ||||
-rw-r--r-- | debian/patches/series | 1 |
4 files changed, 248 insertions, 1 deletions
diff --git a/debian/changelog b/debian/changelog index 57e8c8d..ae9f89d 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,12 +1,14 @@ ipmitool (1.8.16-1) UNRELEASED; urgency=medium - * New upstram release. + * New upstram release (Closes: #810827). * Refresh patches. * Add year 2016 to debian/copyright. * debian/control: - Bump Standards-Version to 3.9.7 (no changes required). - Change Vcs-* and homepage to secure uri. * debian/watch: Bump Version to 4 (no changes required). + * New debian/patches/0105-typo.patch to fix some typos. + * Renew debian/patches/0605-manpage_typo.patch. -- Jörg Frings-Fürst <debian@jff-webhosting.net> Sat, 20 Feb 2016 02:13:33 +0100 diff --git a/debian/patches/0105-typo.patch b/debian/patches/0105-typo.patch new file mode 100644 index 0000000..a755cb4 --- /dev/null +++ b/debian/patches/0105-typo.patch @@ -0,0 +1,217 @@ +Description: Some source typos +Author: Jörg Frings-Fürst <debian@jff-webhosting.net> +Forwarded: https://sourceforge.net/p/ipmitool/bugs/417/ +Last-Update: 2016-02-20 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +Index: trunk/lib/ipmi_hpmfwupg.c +=================================================================== +--- trunk.orig/lib/ipmi_hpmfwupg.c ++++ trunk/lib/ipmi_hpmfwupg.c +@@ -2021,13 +2021,13 @@ HpmfwupgQueryRollbackStatus(struct ipmi_ + memcpy(&pCtx->resp, rsp->data, + sizeof(struct HpmfwupgQueryRollbackStatusResp)); + if (pCtx->resp.rollbackComp.ComponentBits.byte != 0) { +- /* Rollback occured */ ++ /* Rollback occurred */ + lprintf(LOG_NOTICE, +- "Rollback occured on component mask: 0x%02x", ++ "Rollback occurred on component mask: 0x%02x", + pCtx->resp.rollbackComp.ComponentBits.byte); + } else { + lprintf(LOG_NOTICE, +- "No Firmware rollback occured"); ++ "No Firmware rollback occurred"); + } + } else if (rsp->ccode == 0x81) { + lprintf(LOG_ERR, +Index: trunk/include/ipmitool/ipmi_sel.h +=================================================================== +--- trunk.orig/include/ipmitool/ipmi_sel.h ++++ trunk/include/ipmitool/ipmi_sel.h +@@ -194,7 +194,7 @@ static struct ipmi_event_sensor_types oe + { 0xC7 , 0x01 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "FWUM Status", "First Boot After Rollback(error)" }, + { 0xC7 , 0x02 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "FWUM Status", "First Boot After Errors (watchdog)" }, + { 0xC7 , 0x03 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "FWUM Status", "First Boot After Manual Rollback" }, +- { 0xC7 , 0x08 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "FWUM Status", "Firmware Watchdog Bite, reset occured" }, ++ { 0xC7 , 0x08 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "FWUM Status", "Firmware Watchdog Bite, reset occurred" }, + + { 0xC8 , 0x00 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "Switch Mngt Software Status", "Not Loaded" }, + { 0xC8 , 0x01 , 0xff, IPMI_EVENT_CLASS_DISCRETE , "Switch Mngt Software Status", "Initializing" }, +Index: trunk/lib/ipmi_mc.c +=================================================================== +--- trunk.orig/lib/ipmi_mc.c ++++ trunk/lib/ipmi_mc.c +@@ -779,7 +779,7 @@ ipmi_mc_rst_watchdog(struct ipmi_intf * + if (rsp->ccode) { + lprintf(LOG_ERR, "Reset Watchdog Timer command failed: %s", + (rsp->ccode == IPM_WATCHDOG_RESET_ERROR) ? +- "Attempt to reset unitialized watchdog" : ++ "Attempt to reset uninitialized watchdog" : + val2str(rsp->ccode, completion_code_vals)); + return -1; + } +Index: trunk/lib/ipmi_sunoem.c +=================================================================== +--- trunk.orig/lib/ipmi_sunoem.c ++++ trunk/lib/ipmi_sunoem.c +@@ -469,7 +469,7 @@ ipmi_sunoem_led_get(struct ipmi_intf * i + ledtype = str2val(argv[1], sunoem_led_type_vals); + if (ledtype == 0xFF) + lprintf(LOG_ERR, +- "Unknow ledtype, will use data from the SDR oem field"); ++ "Unknown ledtype, will use data from the SDR oem field"); + } + + if (strncasecmp(argv[0], "all", 3) == 0) { +@@ -676,7 +676,7 @@ ipmi_sunoem_led_set(struct ipmi_intf * i + ledtype = str2val(argv[2], sunoem_led_type_vals); + if (ledtype == 0xFF) + lprintf(LOG_ERR, +- "Unknow ledtype, will use data from the SDR oem field"); ++ "Unknown ledtype, will use data from the SDR oem field"); + } + + if (strncasecmp(argv[0], "all", 3) == 0) { +Index: trunk/lib/ipmi_dcmi.c +=================================================================== +--- trunk.orig/lib/ipmi_dcmi.c ++++ trunk/lib/ipmi_dcmi.c +@@ -671,7 +671,7 @@ chk_nm_rsp(struct ipmi_rs * rsp) + * some issue and cannot complete the command + */ + if (rsp == NULL) { +- lprintf(LOG_ERR, "\n No reponse to NM request"); ++ lprintf(LOG_ERR, "\n No response to NM request"); + return 1; + } + /* if the completion code is greater than zero there was an error. We'll +@@ -1426,7 +1426,7 @@ ipmi_dcmi_getthermalpolicy(struct ipmi_i + /* rsp->data[0] is equal to response data byte 2 in spec */ + memcpy(&val, rsp->data, sizeof (val)); + printf("\n"); +- printf(" Persistance flag is: %s\n", ++ printf(" Persistence flag is: %s\n", + ((val.exceptionActions & 0x80) ? "set" : "notset")); + printf(" Exception Actions, taken if the Temperature Limit exceeded:\n"); + printf(" Hard Power Off system and log event: %s\n", +@@ -3163,7 +3163,7 @@ ipmi_nm_thresh(struct ipmi_intf * intf, + return -1; + } + if (str2ushort(argv[0], &thresh.thresholds[i++]) < 0) { +- lprintf(LOG_ERR,"threshold value %d count must be a positve integer.\n", i); ++ lprintf(LOG_ERR,"threshold value %d count must be a positive integer.\n", i); + return -1; + } + default: +Index: trunk/include/ipmitool/ipmi_sol.h +=================================================================== +--- trunk.orig/include/ipmitool/ipmi_sol.h ++++ trunk/include/ipmitool/ipmi_sol.h +@@ -64,7 +64,7 @@ struct sol_config_parameters { + + + /* +- * The ACTIVATE PAYLOAD command reponse structure ++ * The ACTIVATE PAYLOAD command response structure + * From table 24-2 of the IPMI v2.0 spec + */ + #ifdef PRAGMA_PACK +Index: trunk/src/plugins/lanplus/lanplus.c +=================================================================== +--- trunk.orig/src/plugins/lanplus/lanplus.c ++++ trunk/src/plugins/lanplus/lanplus.c +@@ -606,7 +606,7 @@ ipmiv2_lan_ping(struct ipmi_intf * intf) + * Receive whatever comes back. Ignore received packets that don't correspond + * to a request we've sent. + * +- * Returns: the ipmi_rs packet describing the/a reponse we expect. ++ * Returns: the ipmi_rs packet describing the/a response we expect. + */ + static struct ipmi_rs * + ipmi_lan_poll_single(struct ipmi_intf * intf) +@@ -651,7 +651,7 @@ ipmi_lan_poll_single(struct ipmi_intf * + * + * 1) An IPMI 1.5 packet (the response to our GET CHANNEL + * AUTHENTICATION CAPABILITIES request) +- * 2) An RMCP+ message with an IPMI reponse payload ++ * 2) An RMCP+ message with an IPMI response payload + * 3) AN RMCP+ open session response + * 4) An RAKP-2 message (response to an RAKP 1 message) + * 5) An RAKP-4 message (response to an RAKP 3 message) +@@ -681,7 +681,7 @@ ipmi_lan_poll_single(struct ipmi_intf * + } + + /* +- * Handle IPMI responses (case #1 and #2) -- all IPMI reponses ++ * Handle IPMI responses (case #1 and #2) -- all IPMI responses + */ + if (rsp->session.payloadtype == IPMI_PAYLOAD_TYPE_IPMI) { + struct ipmi_rq_entry * entry; +@@ -863,7 +863,7 @@ ipmi_lan_poll_single(struct ipmi_intf * + * Receive whatever comes back. Ignore received packets that don't correspond + * to a request we've sent. + * +- * Returns: the ipmi_rs packet describing the/a reponse we expect. ++ * Returns: the ipmi_rs packet describing the/a response we expect. + */ + static struct ipmi_rs * + ipmi_lan_poll_recv(struct ipmi_intf * intf) +@@ -881,7 +881,7 @@ ipmi_lan_poll_recv(struct ipmi_intf * in + + + /* +- * read_open_session_reponse ++ * read_open_session_response + * + * Initialize the ipmi_rs from the IPMI 2.x open session response data. + * +@@ -903,7 +903,7 @@ read_open_session_response(struct ipmi_r + /* Message tag */ + rsp->payload.open_session_response.message_tag = rsp->data[offset]; + +- /* RAKP reponse code */ ++ /* RAKP response code */ + rsp->payload.open_session_response.rakp_return_code = rsp->data[offset + 1]; + + /* Maximum privilege level */ +@@ -970,7 +970,7 @@ read_rakp2_message( + /* Message tag */ + rsp->payload.rakp2_message.message_tag = rsp->data[offset]; + +- /* RAKP reponse code */ ++ /* RAKP response code */ + rsp->payload.rakp2_message.rakp_return_code = rsp->data[offset + 1]; + + /* Console session ID */ +@@ -1051,7 +1051,7 @@ read_rakp4_message( + /* Message tag */ + rsp->payload.rakp4_message.message_tag = rsp->data[offset]; + +- /* RAKP reponse code */ ++ /* RAKP response code */ + rsp->payload.rakp4_message.rakp_return_code = rsp->data[offset + 1]; + + /* Console session ID */ +@@ -3416,7 +3416,7 @@ ipmi_lanplus_open(struct ipmi_intf * int + if (!ipmi_oem_active(intf, "i82571spt") && + ipmi_get_auth_capabilities_cmd(intf, &auth_cap)) { + lprintf(LOG_INFO, "Error issuing Get Channel " +- "Authentication Capabilies request"); ++ "Authentication Capabilities request"); + goto fail; + } + +Index: trunk/src/plugins/lan/lan.c +=================================================================== +--- trunk.orig/src/plugins/lan/lan.c ++++ trunk/src/plugins/lan/lan.c +@@ -970,7 +970,7 @@ ipmi_lan_send_cmd(struct ipmi_intf * int + // Example: We have to send command 23 and 2d. + // If we send command,seq as 23,10 and if we dont get any response it will + // retry 4 times with 23,10 and then come out here and indicate that there is no +- // reponse from the remote controller and will send the next command for ++ // response from the remote controller and will send the next command for + // ie 2d,11. And if the BMC is slow to respond and returns 23,10 then it + // will match it in the list and will take response of command 23 as response + // for command 2d and return success. So ideally when retries are done and diff --git a/debian/patches/0605-manpage_typo.patch b/debian/patches/0605-manpage_typo.patch index 982036c..c1adfdb 100644 --- a/debian/patches/0605-manpage_typo.patch +++ b/debian/patches/0605-manpage_typo.patch @@ -216,6 +216,15 @@ Index: trunk/doc/ipmitool.1 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* .TP \fIunmatch\fP <\fBxx=filename\fR> <\fBxx=filename\fR> \fB...\fr +@@ -2516,7 +2516,7 @@ Remove a policy. If domain is not suppli + \fIpower\fP \fImin\fP <minimum> \fImax\fP <maximum> [\fIdomain\fP <platform|CPU|Memory>] + .br + +-Configure Node Manager power minumum and maximum power draw limits. ++Configure Node Manager power minimum and maximum power draw limits. + The \fImin\fP and \fImax\fP values must be in the range of 0-65535. + If domain is not supplied a default of platform is used. + @@ -3269,7 +3269,7 @@ I2C Master Write\-Read IPMI command. Execute the service processor command line interface commands. @@ -225,6 +234,24 @@ Index: trunk/doc/ipmitool.1 command string is specified, the command string is executed on the service processor and the connection is closed. .TP +@@ -3515,7 +3515,7 @@ a 2.4\-based kernel in order for ipmitoo + Incoming and outgoing message handler for IPMI interfaces. + .TP + .B ipmi_kcs_drv +-An IPMI Keyboard Controler Style (KCS) interface driver for the message handler. ++An IPMI Keyboard Controller Style (KCS) interface driver for the message handler. + .TP + .B ipmi_devintf + Linux character device interface for the message handler. +@@ -3553,7 +3553,7 @@ ipmitool includes some sample initializa + can perform this task automatically at start\-up. + + In order to have ipmitool use the OpenIPMI device interface +-you can specifiy it on the command line: ++you can specify it on the command line: + .PP + ipmitool \fB\-I\fR \fIopen\fP <\fIcommand\fP> + .SH "BMC INTERFACE" @@ -3664,7 +3664,7 @@ encryption algorightms. The ipmitool \fIfree\fP interface utilizes the FreeIPMI libfreeipmi drivers. diff --git a/debian/patches/series b/debian/patches/series index 48d1d23..389336b 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,4 +1,5 @@ 0605-manpage_typo.patch +0105-typo.patch 0100-fix_buf_overflow.patch 0500-fix_CVE-2011-4339.patch 0610-readme_typo.patch |