42402f11b7
* Includes fixes since v3.1.1 * Enhance support for newer (5.0+) kernels - Update spec: * Move rules-related files into new subpackage `audit-rules': * Files moved: - /sbin/auditctl, /sbin/augenrules, /etc/audit/{audit.rules,rules.d/audit.rules,audit-stop.rules} - manpages for auditctl, augenrules, and audit.rules - /etc/audit is now owned by `audit-rules' as well * Add new file /usr/lib/systemd/system/audit-rules.service * Remove in-house create-augenrules-service.patch that generated augenrules.service systemd unit service * Remove ownership of /usr/share/audit * Create /usr/share/audit-rules directory on %install * Remove audit-userspace-517-compat.patch (fixed upstream) * Remove libev-werror.patch (fixed upstream) * Remove audit-allow-manual-stop.patch (fixed upstream) * Add fix-auparse-test.patch (downstream): Upstream tests uses a static value (42) for 'gdm' uid/gid (based on Fedora values, apparently). Replace these occurrences with 'unknown(123456)' * Replace '--with-python' with '--with-python3' on %configure * Remove autrace and auvirt references (upstream) * Replace README with README.md - Drop `--enable-systemd' from %configure as SysV-style scripts aren't supported in upstream since 113ae191758c ("Drop support for SysVinit") - Update to 4.0 * Includes fixes since v3.1.1 * Enhance support for newer (5.0+) kernels - Update spec: * Add fix-auparse-test.patch (downstream): Upstream tests uses a static value (42) for 'gdm' uid/gid (based on Fedora values, apparently). Replace these occurrences with 'unknown(123456)' * Replace '--with-python' with '--with-python3' on %configure * Add new headers 'audit_logging.h' and 'audit-records.h' for audit-devel TODO: fix build for SLE/Leap OBS-URL: https://build.opensuse.org/package/show/security/audit?expand=0&rev=153
39 lines
1.7 KiB
Diff
39 lines
1.7 KiB
Diff
From: Sergei Trofimovich <slyich@gmail.com>
|
|
Date: Wed, 23 Mar 2022 07:27:05 +0000
|
|
Subject: [PATCH] auditswig.i: avoid setter generation for audit_rule_data::buf
|
|
References: https://github.com/linux-audit/audit-userspace/issues/252
|
|
Git-commit: https://github.com/linux-audit/audit-userspace/pull/253/commits/beed138222421a2eb4212d83cb889404bd7efc49
|
|
Git-repo: [if different from https://github.com/linux-audit/audit-userspace.git]
|
|
Patch-mainline: submitted for review upstream
|
|
|
|
As it's a flexible array generated code was never safe to use.
|
|
With kernel's https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed98ea2128b6fd83bce13716edf8f5fe6c47f574
|
|
change it's a build failure now:
|
|
|
|
audit> audit_wrap.c:5010:15: error: invalid use of flexible array member
|
|
audit> 5010 | arg1->buf = (char [])(char *)memcpy(malloc((size)*sizeof(char)), (const char *)(arg2), sizeof(char)*(size));
|
|
audit> | ^
|
|
|
|
Let's avoid setter generation entirely.
|
|
|
|
Closes: https://github.com/linux-audit/audit-userspace/issues/252
|
|
---
|
|
bindings/swig/src/auditswig.i | 4 ++++
|
|
1 file changed, 4 insertions(+)
|
|
|
|
diff --git a/bindings/swig/src/auditswig.i b/bindings/swig/src/auditswig.i
|
|
index 21aafca31..9a2c5661d 100644
|
|
--- a/bindings/swig/src/auditswig.i
|
|
+++ b/bindings/swig/src/auditswig.i
|
|
@@ -39,6 +39,10 @@ signed
|
|
#define __attribute(X) /*nothing*/
|
|
typedef unsigned __u32;
|
|
typedef unsigned uid_t;
|
|
+/* Sidestep SWIG's limitation of handling c99 Flexible arrays by not:
|
|
+ * generating setters against them: https://github.com/swig/swig/issues/1699
|
|
+ */
|
|
+%ignore audit_rule_data::buf;
|
|
%include "/usr/include/linux/audit.h"
|
|
#define __extension__ /*nothing*/
|
|
%include <stdint.i>
|