Package: universal-ctags
Version: 0+git20200824-1.1
Severity: minor
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu impish ubuntu-patch

Dear Maintainer,

The current universal-ctags version fails to build against glibc 2.33,
as shown in
https://launchpad.net/ubuntu/+source/universal-ctags/0+git20200824-1.1/+build/21478505
This issue was fixed upstream in 
https://github.com/universal-ctags/ctags/pull/2990

While glibc 2.33 is not yet available in Debian, I thought it would be
nive to report this in here, in case glibc 2.33 lands in unstable before
this package gets updated to the latest upstream version (which carries
the mentioned fix).

In Ubuntu, the attached patch was submitted in
https://bugs.launchpad.net/ubuntu/+source/universal-ctags/+bug/1934829,
which is a backport of the upstream fix.

Once again, note that this patch is not needed in Debian at the moment.

  * Add newfstatat seccomp rule for glibc 2.33 builds
    - d/p/series: apply new patch
      0001-main-add-newfstatat-to-seccomp-rules.patch


Best Regards,

Athos
diff -Nru 
universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch
 
universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch
--- 
universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch
        1969-12-31 21:00:00.000000000 -0300
+++ 
universal-ctags-0+git20200824/debian/patches/0001-main-add-newfstatat-to-seccomp-rules.patch
        2021-07-06 16:48:58.000000000 -0300
@@ -0,0 +1,34 @@
+From f827e85fdee9bc438d3d28612c99478f9957e612 Mon Sep 17 00:00:00 2001
+From: Masatake YAMATO <yam...@redhat.com>
+Date: Sun, 2 May 2021 02:18:35 +0900
+Subject: [PATCH] main: add newfstatat to seccomp rules
+
+Close #2894.
+
+Signed-off-by: Masatake YAMATO <yam...@redhat.com>
+
+Origin: backport, 
https://github.com/universal-ctags/ctags/commit/f827e85fdee9bc438d3d28612c99478f9957e612
+Bug: https://github.com/universal-ctags/ctags/issues/2894
+Last-Update: 2021-07-05
+
+---
+ main/seccomp.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/main/seccomp.c b/main/seccomp.c
+index 12e60982..27e704ea 100644
+--- a/main/seccomp.c
++++ b/main/seccomp.c
+@@ -43,6 +43,9 @@ int installSyscallFilter (void)
+       // The bowels of stdio want to know the size of a file, even for stdout.
+       seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat), 0);
+       seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat64), 0);
++#ifdef __SNR_newfstatat
++      seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (newfstatat), 0);
++#endif
+ 
+       // seems unnecessary, but this comes from
+       // main/parse.c:2764 : tagFilePosition (&tagfpos);
+-- 
+2.25.1
+
diff -Nru universal-ctags-0+git20200824/debian/patches/series 
universal-ctags-0+git20200824/debian/patches/series
--- universal-ctags-0+git20200824/debian/patches/series 1969-12-31 
21:00:00.000000000 -0300
+++ universal-ctags-0+git20200824/debian/patches/series 2021-07-06 
16:48:13.000000000 -0300
@@ -0,0 +1 @@
+0001-main-add-newfstatat-to-seccomp-rules.patch

Reply via email to