index : packages | |
Archlinux32 package modifications | gitolite user |
summaryrefslogtreecommitdiff |
author | Andreas Baumann <mail@andreasbaumann.cc> | 2019-06-12 08:34:23 +0200 |
---|---|---|
committer | Andreas Baumann <mail@andreasbaumann.cc> | 2019-06-12 08:34:23 +0200 |
commit | 6f6adb5514b8194c2133465c3068e886f1508e90 (patch) | |
tree | 0301e8dc9dd572825b59a543289ee4d54413cd77 /extra/ctags | |
parent | f6ee164cc9410ed9ae70c31de01833a4a199a9d8 (diff) |
-rw-r--r-- | extra/ctags/PKGBUILD | 13 | ||||
-rw-r--r-- | extra/ctags/ctags-seccomp32.patch | 16 |
diff --git a/extra/ctags/PKGBUILD b/extra/ctags/PKGBUILD deleted file mode 100644 index e6235180..00000000 --- a/extra/ctags/PKGBUILD +++ /dev/null @@ -1,13 +0,0 @@ -# See https://github.com/universal-ctags/ctags/issues/1937 and -# https://github.com/universal-ctags/ctags/pull/1938 - -source+=('ctags-seccomp32.patch') -sha512sums+=('749f3db52c17a6af85a725a76e625c06ecf9bd1fd785e1c268800fb882a88f6229cbbab3c9af01a1e4a01ed00de5d887f8616942f77322c1bdc3b626b9165ba0') - -eval "$( - declare -f prepare | \ - sed ' - /}/ i \ - patch -Np1 < ${srcdir}/ctags-seccomp32.patch - ' -)" diff --git a/extra/ctags/ctags-seccomp32.patch b/extra/ctags/ctags-seccomp32.patch deleted file mode 100644 index f371b969..00000000 --- a/extra/ctags/ctags-seccomp32.patch +++ /dev/null @@ -1,16 +0,0 @@ -diff -rauN ctags/main/seccomp.c ctags-seccomp32-patch/main/seccomp.c ---- ctags/main/seccomp.c 2018-11-22 16:36:35.366666457 +0100 -+++ ctags-seccomp32-patch/main/seccomp.c 2018-11-22 16:37:05.683333126 +0100 -@@ -41,10 +41,12 @@ - - // The bowels of stdio want to know the size of a file, even for stdout. - seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat), 0); -+ seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (fstat64), 0); - - // seems unnecessary, but this comes from - // main/parse.c:2764 : tagFilePosition (&tagfpos); - seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (lseek), 0); -+ seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (_llseek), 0); - - // libxml2 uses pthread_once, which in turn uses a futex - seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS (futex), 0); |