Package: universal-ctags Version: 0+git20200824-1.1 Severity: minor Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu impish ubuntu-patch
Dear Maintainer, The current universal-ctags version fails to build against glibc 2.33, as shown in https://launchpad.net/ubuntu/+source/universal-ctags/0+git20200824-1.1/+build/21478505 This issue was fixed upstream in https://github.com/universal-ctags/ctags/pull/2990 While glibc 2.33 is not yet available in Debian, I thought it would be nive to report this in here, in case glibc 2.33 lands in unstable before this package gets updated to the latest upstream version (which carries the mentioned fix). In Ubuntu, the attached patch was submitted in https://bugs.launchpad.net/ubuntu/+source/universal-ctags/+bug/1934829, which is a backport of the upstream fix. Once again, note that this patch is not needed in Debian at the moment. * Add newfstatat seccomp rule for glibc 2.33 builds - d/p/series: apply new patch 0001-main-add-newfstatat-to-seccomp-rules.patch Best Regards, Athos
diff -Nru universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch --- universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch 1969-12-31 21:00:00.000000000 -0300 +++ universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch 2021-07-06 16:48:58.000000000 -0300 @@ -0,0 +1,34 @@ +From f827e85fdee9bc438d3d28612c99478f9957e612 Mon Sep 17 00:00:00 2001 +From: Masatake YAMATO <yam...@redhat.com> +Date: Sun, 2 May 2021 02:18:35 +0900 +Subject: [PATCH] main: add newfstatat to seccomp rules + +Close #2894. + +Signed-off-by: Masatake YAMATO <yam...@redhat.com> + +Origin: backport, https://github.com/universal-ctags/ctags/commit/f827e85fdee9bc438d3d28612c99478f9957e612 +Bug: https://github.com/universal-ctags/ctags/issues/2894 +Last-Update: 2021-07-05 + +--- + main/seccomp.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/main/seccomp.c b/main/seccomp.c +index 12e60982..27e704ea 100644 +--- a/main/seccomp.c ++++ b/main/seccomp.c +@@ -43,6 +43,9 @@ int installSyscallFilter (void) + // The bowels of stdio want to know the size of a file, even for stdout. + seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat), 0); + seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat64), 0); ++#ifdef __SNR_newfstatat ++ seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (newfstatat), 0); ++#endif + + // seems unnecessary, but this comes from + // main/parse.c:2764 : tagFilePosition (&tagfpos); +-- +2.25.1 + diff -Nru universal-ctags-0+git20200824/debian/patches/series universal-ctags-0+git20200824/debian/patches/series --- universal-ctags-0+git20200824/debian/patches/series 1969-12-31 21:00:00.000000000 -0300 +++ universal-ctags-0+git20200824/debian/patches/series 2021-07-06 16:48:13.000000000 -0300 @@ -0,0 +1 @@ +0001-main-add-newfstatat-to-seccomp-rules.patch