On Tuesday, December 15, 2015 at 1:46:31 PM UTC-5, GitHub wrote:
> Branch: refs/heads/master
>   Home:   https://github.com/seccomp/libseccomp
>   Commit: 6d7b7c8e27b0cb2ba0470ff02917d1faba9430ba
>       
> https://github.com/seccomp/libseccomp/commit/6d7b7c8e27b0cb2ba0470ff02917d1faba9430ba
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-06 (Fri, 06 Feb 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     A src/arch-ppc64-syscalls.c
>     A src/arch-ppc64.c
>     A src/arch-ppc64.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
>     M tools/util.h
> 
>   Log Message:
>   -----------
>   arch: add a ppc64 syscall table
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: daed219e5df2e85f994b89a55f7271849367a7f1
>       
> https://github.com/seccomp/libseccomp/commit/daed219e5df2e85f994b89a55f7271849367a7f1
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-06 (Fri, 06 Feb 2015)
> 
>   Changed paths:
>     M src/arch.c
>     M src/python/libseccomp.pxd
>     M src/python/seccomp.pyx
> 
>   Log Message:
>   -----------
>   arch: add the basic initial support for ppc64 to the arch-dependent code
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 2176cdc71cc5dcc066879eeff5744d007bbce932
>       
> https://github.com/seccomp/libseccomp/commit/2176cdc71cc5dcc066879eeff5744d007bbce932
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-06 (Fri, 06 Feb 2015)
> 
>   Changed paths:
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_disasm.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   tools: add ppc64 support
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: c36a0c9b8c5ed81cea710827500b3de315c9609a
>       
> https://github.com/seccomp/libseccomp/commit/c36a0c9b8c5ed81cea710827500b3de315c9609a
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-06 (Fri, 06 Feb 2015)
> 
>   Changed paths:
>     M tests/16-sim-arch_basic.c
>     M tests/16-sim-arch_basic.py
>     M tests/23-sim-arch_all_le_basic.c
>     M tests/23-sim-arch_all_le_basic.py
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/26-sim-arch_all_be_basic.py
>     M tests/regression
> 
>   Log Message:
>   -----------
>   tests: add ppc64 support to the regression tests
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 9432a8b64051ec477a602f38c7cf93ae7c1c987f
>       
> https://github.com/seccomp/libseccomp/commit/9432a8b64051ec477a602f38c7cf93ae7c1c987f
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-10 (Tue, 10 Feb 2015)
> 
>   Changed paths:
>     M tests/regression
> 
>   Log Message:
>   -----------
>   tests: add ppc64 support to the regression live tests
> 
> Otherwise The live tests will fail with
> 
> "ERROR arch ppc64 not supported"
> 
> Send against the working-ppc64 branch.
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> [PM: added ppc64le]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: d2a4f2f7c7c626bd995fee2967e1edad7b6a156c
>       
> https://github.com/seccomp/libseccomp/commit/d2a4f2f7c7c626bd995fee2967e1edad7b6a156c
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-10 (Tue, 10 Feb 2015)
> 
>   Changed paths:
>     M src/arch-ppc64-syscalls.c
>     M src/arch-syscall-validate
> 
>   Log Message:
>   -----------
>   ppc64: correct the ppc64 syscall table and validation script
> 
> We didn't correctly take into account the __powerpc64__ define when
> generating the ppc64 syscall table.  This patch also updates the
> syscall table to match Linux v3.19.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 19ef2ce199428c3f5088107ae9b9df4fce919d17
>       
> https://github.com/seccomp/libseccomp/commit/19ef2ce199428c3f5088107ae9b9df4fce919d17
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-11 (Wed, 11 Feb 2015)
> 
>   Changed paths:
>     M src/arch-syscall-check.c
> 
>   Log Message:
>   -----------
>   tests: minor fix in arch-syscall-check
> 
> Sent against working-ppc64.
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 3a7054f43a0b8615b96ddc7036539cd10142cc4d
>       
> https://github.com/seccomp/libseccomp/commit/3a7054f43a0b8615b96ddc7036539cd10142cc4d
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-12 (Thu, 12 Feb 2015)
> 
>   Changed paths:
>     M configure.ac
> 
>   Log Message:
>   -----------
>   all: reset the version in the master branch to 0.0.0
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 83e58d25b0785a957db1d8b4c46034ef386b46ed
>       
> https://github.com/seccomp/libseccomp/commit/83e58d25b0785a957db1d8b4c46034ef386b46ed
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-12 (Thu, 12 Feb 2015)
> 
>   Changed paths:
>     M CHANGELOG
>     M CREDITS
>     M include/seccomp.h.in
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
> 
>   Log Message:
>   -----------
>   Merge branch 'master' into working-ppc64
> 
> 
>   Commit: 7a7a83a24491f636d422e951f9e0547caaa68967
>       
> https://github.com/seccomp/libseccomp/commit/7a7a83a24491f636d422e951f9e0547caaa68967
>   Author: Paul Moore <[email protected]>
>   Date:   2015-02-13 (Fri, 13 Feb 2015)
> 
>   Changed paths:
>     M tools/util.h
> 
>   Log Message:
>   -----------
>   tools: add the missing elf.h header file
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: c1a168dfb53defb637754de9d6837b8fcf3b0213
>       
> https://github.com/seccomp/libseccomp/commit/c1a168dfb53defb637754de9d6837b8fcf3b0213
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-17 (Tue, 17 Feb 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     A src/arch-ppc-syscalls.c
>     A src/arch-ppc.c
>     A src/arch-ppc.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
> 
>   Log Message:
>   -----------
>   arch: add a ppc syscall table
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> [PM: slight reordering of ppc/ppc64 in header files and makefiles]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: a2ad734f9344406a898feb02462603bc4b0b3a81
>       
> https://github.com/seccomp/libseccomp/commit/a2ad734f9344406a898feb02462603bc4b0b3a81
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-17 (Tue, 17 Feb 2015)
> 
>   Changed paths:
>     M src/arch.c
>     M src/python/libseccomp.pxd
>     M src/python/seccomp.pyx
> 
>   Log Message:
>   -----------
>   arch: add basic initial ppc support to the arch-dependent code
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: b6cdaa0e09a2fe3e47b4272597c208a33464c20f
>       
> https://github.com/seccomp/libseccomp/commit/b6cdaa0e09a2fe3e47b4272597c208a33464c20f
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-17 (Tue, 17 Feb 2015)
> 
>   Changed paths:
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_disasm.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   tools: add ppc support
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 0843a460f72da50756432a021c387fe8a7ab0bd5
>       
> https://github.com/seccomp/libseccomp/commit/0843a460f72da50756432a021c387fe8a7ab0bd5
>   Author: Bogdan Purcareata <[email protected]>
>   Date:   2015-02-17 (Tue, 17 Feb 2015)
> 
>   Changed paths:
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/26-sim-arch_all_be_basic.py
>     M tests/regression
> 
>   Log Message:
>   -----------
>   tests: add ppc support to the regression tests
> 
> Signed-off-by: Bogdan Purcareata <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 5b813a7331dcadd5d8b63532df8d07cdf47a041e
>       
> https://github.com/seccomp/libseccomp/commit/5b813a7331dcadd5d8b63532df8d07cdf47a041e
>   Author: Brian Cain <[email protected]>
>   Date:   2015-03-13 (Fri, 13 Mar 2015)
> 
>   Changed paths:
>     M tests/15-basic-resolver.c
> 
>   Log Message:
>   -----------
>   tests: fixed leak in basic-resolver
> 
> seccomp_syscall_resolve_num_arch() returns a string from strdup() that
> needs to be reaped.  I found this bug using clang and
> address-sanitizer.
> 
> Signed-off-by: Brian Cain <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 49419d82c80129323c78ad51a7fd7b317e511b5f
>       
> https://github.com/seccomp/libseccomp/commit/49419d82c80129323c78ad51a7fd7b317e511b5f
>   Author: Brian Cain <[email protected]>
>   Date:   2015-03-20 (Fri, 20 Mar 2015)
> 
>   Changed paths:
>     M tests/02-sim-basic.py
>     M tests/03-sim-basic_chains.py
>     M tests/04-sim-multilevel_chains.py
>     M tests/18-sim-basic_whitelist.py
>     M tests/22-sim-basic_chains_array.py
>     M tests/25-sim-multilevel_chains_adv.py
> 
>   Log Message:
>   -----------
>   tests: purge the heretical semicolons
> 
> These were likely vestiges from the C implementation of the
> corresponding tests.  But in python, we've been liberated from the
> bonds of semicolons, let us rejoice and instead serve our
> new whitespace masters!
> 
> Signed-off-by: Brian Cain <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 67de487698778eeabadf28687ce5df3c795fb511
>       
> https://github.com/seccomp/libseccomp/commit/67de487698778eeabadf28687ce5df3c795fb511
>   Author: Brian Cain <[email protected]>
>   Date:   2015-03-30 (Mon, 30 Mar 2015)
> 
>   Changed paths:
>     M src/gen_pfc.c
> 
>   Log Message:
>   -----------
>   pfc: fix some warnings
> 
> Fixed a couple of warnings -- 'rc' was used-uninitialized IIRC and
> missing enums from the switch.
> 
> Signed-off-by: Brian Cain <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 4992bc217387c44dfbd9a4d290cdc42ba098b124
>       
> https://github.com/seccomp/libseccomp/commit/4992bc217387c44dfbd9a4d290cdc42ba098b124
>   Author: Paul Moore <[email protected]>
>   Date:   2015-04-03 (Fri, 03 Apr 2015)
> 
>   Changed paths:
>     A tests/27-sim-bpf_blk_state.c
>     A tests/27-sim-bpf_blk_state.py
>     A tests/27-sim-bpf_blk_state.tests
>     M tests/Makefile.am
> 
>   Log Message:
>   -----------
>   tests: test the bpf accumulator checking logic
> 
> When building the BPF filter code we need to ensure that we take the
> state of the BPF state machine accumulator into account.  This test
> creates a situation where the BPF filter code generator needs to
> perform some extra work to ensure the accumulator state is correct.
> 
> This test is based on a bug reproducer by Matthew Heon.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: b43a7dde03f96ce6a291eb58f620c5d2b7700b51
>       
> https://github.com/seccomp/libseccomp/commit/b43a7dde03f96ce6a291eb58f620c5d2b7700b51
>   Author: Paul Moore <[email protected]>
>   Date:   2015-04-03 (Fri, 03 Apr 2015)
> 
>   Changed paths:
>     M src/gen_bpf.c
> 
>   Log Message:
>   -----------
>   bpf: track accumulator state and reload it when necessary
> 
> It turns out there are a few corner cases where we incorrectly
> generate seccomp BPF due to poor accumulator state tracking for each
> BPF instruction block.  This patch adds accumulator state tracking
> such that we know what any given instruction block expects from the
> accumulator and what value it leaves in the accumulator when it is
> finished.  This allows us to veryify the accumulator state when
> assembling the instruction blocks into the final BPF program and if
> necessary we can insert accumulator load/mask instructions to
> maintain the proper accumulator state.
> 
> Reported-by: Matthew Heon <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: f530cb495857c3d9fcf9d82b74893aec9caa6053
>       
> https://github.com/seccomp/libseccomp/commit/f530cb495857c3d9fcf9d82b74893aec9caa6053
>   Author: Paul Moore <[email protected]>
>   Date:   2015-04-03 (Fri, 03 Apr 2015)
> 
>   Changed paths:
>     M src/gen_bpf.c
> 
>   Log Message:
>   -----------
>   bpf: fix a style-o
> 
> That would be a type-o which results in bad style :)
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: d1019115acdc8460c9a1f8a878768001a3c32431
>       
> https://github.com/seccomp/libseccomp/commit/d1019115acdc8460c9a1f8a878768001a3c32431
>   Author: Paul Moore <[email protected]>
>   Date:   2015-04-10 (Fri, 10 Apr 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/arch-arm-syscalls.c
>     M src/arch-syscall-validate
> 
>   Log Message:
>   -----------
>   arm: fix some problems with the syscall table
> 
> The 32-bit ARM syscall table mistakenly included syscall definitions
> for the syscalls below.  This patch redefines those syscalls to
> libseccomp's pseudo-syscall numbers and corrects the
> arch-syscall-validate to correctly list the 32-bit ARM syscalls.
> 
>  * time
>  * umount
>  * stime
>  * alarm
>  * utime
>  * getrlimit
>  * select
>  * readdir
>  * mmap
>  * socketcall
>  * syscall
>  * ipc
> 
> Reported-by: Andreas Farber <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: a710a2d246bdc73ba77e3ff5624e790688cc51fd
>       
> https://github.com/seccomp/libseccomp/commit/a710a2d246bdc73ba77e3ff5624e790688cc51fd
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-06 (Wed, 06 May 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     M src/arch-syscall-validate
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
> 
>   Log Message:
>   -----------
>   arm: add some missing syscalls
> 
> Add the following syscalls to the ARM arch/ABI and update the syscall
> validation script.
> 
>  * breakpoint()
>  * cacheflush()
>  * usr26()
>  * usr32()
>  * set_tls()
> 
> Reported-by: Purcareata Bogdan <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: d32ef67e87ae4005e6456d17c071dbd410d957ea
>       
> https://github.com/seccomp/libseccomp/commit/d32ef67e87ae4005e6456d17c071dbd410d957ea
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-06 (Wed, 06 May 2015)
> 
>   Changed paths:
>     M tests/.gitignore
> 
>   Log Message:
>   -----------
>   build: update the .gitignore file under tests/
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 4367b1b4f94ca1e0c0606ff85622f2ecb1a9c278
>       
> https://github.com/seccomp/libseccomp/commit/4367b1b4f94ca1e0c0606ff85622f2ecb1a9c278
>   Author: Mike Strosaker <[email protected]>
>   Date:   2015-05-06 (Wed, 06 May 2015)
> 
>   Changed paths:
>     M src/python/seccomp.pyx
> 
>   Log Message:
>   -----------
>   python: ensure attributes are treated as 32 bits
> 
> Retrieving attributes using the Python bindings fails on some platforms.
> The attributes are encoded in a 32-bit mask.  Python variables are
> usually larger (64 bits); Cython is not capable of recognizing that it
> should only use a 32-bit number on every platform.  This patch ensures
> that the variable used to store the value of the attribute is only 32 bits.
> 
> Signed-off-by: Michael Strosaker <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: f8de89b8764afa1e714e7b6d1c2247a655ed5470
>       
> https://github.com/seccomp/libseccomp/commit/f8de89b8764afa1e714e7b6d1c2247a655ed5470
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-07 (Thu, 07 May 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M tools/util.h
> 
>   Log Message:
>   -----------
>   all: ensure the ARM and MIPS system defines are present
> 
> On some really old systems the ELF and or Audit ABI/arch defines are
> missing, this patch provides our own #defines in these cases.
> 
> Reported-by: [email protected]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 0cd288bee5879af3aab6c447de55c90d4971e38c
>       
> https://github.com/seccomp/libseccomp/commit/0cd288bee5879af3aab6c447de55c90d4971e38c
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-09 (Sat, 09 May 2015)
> 
>   Changed paths:
>     M src/api.c
>     M src/arch.c
>     M src/db.c
>     M src/gen_bpf.c
>     M src/hash.c
> 
>   Log Message:
>   -----------
>   docs: fix a number of problems in the function header comments
> 
> Reported-by: Brian Cain <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: c940cdf15b1c9f742949f422589ee1d0287e0db3
>       
> https://github.com/seccomp/libseccomp/commit/c940cdf15b1c9f742949f422589ee1d0287e0db3
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-09 (Sat, 09 May 2015)
> 
>   Changed paths:
>     M README
> 
>   Log Message:
>   -----------
>   doc: update the README based on feedback from the v2.2.0 release
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 21f4fa4c90fa57022f3494633871f2a74be22cdc
>       
> https://github.com/seccomp/libseccomp/commit/21f4fa4c90fa57022f3494633871f2a74be22cdc
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-09 (Sat, 09 May 2015)
> 
>   Changed paths:
>     M CREDITS
> 
>   Log Message:
>   -----------
>   doc: update the CREDITS file
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 4fe675fc2f62e7856d8992d23c51847129d47b22
>       
> https://github.com/seccomp/libseccomp/commit/4fe675fc2f62e7856d8992d23c51847129d47b22
>   Author: Paul Moore <[email protected]>
>   Date:   2015-05-13 (Wed, 13 May 2015)
> 
>   Changed paths:
>     M CHANGELOG
> 
>   Log Message:
>   -----------
>   all: update CHANGELOG and version info for v2.2.1
> 
> Signed-off-by: Paul Moore <[email protected]>
> (imported from commit f506e0844372b2c404baa482defb62f6846d0e3e)
> 
> 
>   Commit: 37a609498a218c370e86d34470a21d0d98db3b4f
>       
> https://github.com/seccomp/libseccomp/commit/37a609498a218c370e86d34470a21d0d98db3b4f
>   Author: Paul Moore <[email protected]>
>   Date:   2015-06-11 (Thu, 11 Jun 2015)
> 
>   Changed paths:
>     M tests/27-sim-bpf_blk_state.c
>     M tests/27-sim-bpf_blk_state.py
>     M tests/27-sim-bpf_blk_state.tests
> 
>   Log Message:
>   -----------
>   tests: make 27-sim-bpf_blk_state architecture independent
> 
> Using any of the socket related syscalls is always problematic, use
> a generic syscall number for this test since it isn't syscall
> specific.
> 
> Reported-by: Jan Willeke <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 9b16b91c1293c3629529d288018415e309043daa
>       
> https://github.com/seccomp/libseccomp/commit/9b16b91c1293c3629529d288018415e309043daa
>   Author: Colin Walters <[email protected]>
>   Date:   2015-06-12 (Fri, 12 Jun 2015)
> 
>   Changed paths:
>     M src/Makefile.am
>     M tools/Makefile.am
> 
>   Log Message:
>   -----------
>   build: Fix srcdir != builddir from git
> 
> See https://github.com/cgwalters/build-api/blob/master/build-api.md
> 
> Signed-off-by: Colin Walters <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 25be15a99463286f1dcf8ba581ad9b94676db754
>       
> https://github.com/seccomp/libseccomp/commit/25be15a99463286f1dcf8ba581ad9b94676db754
>   Author: Mathias Krause' via libseccomp <[email protected]>
>   Date:   2015-06-15 (Mon, 15 Jun 2015)
> 
>   Changed paths:
>     M tests/.gitignore
>     A tests/28-sim-arch_x86.c
>     A tests/28-sim-arch_x86.py
>     A tests/28-sim-arch_x86.tests
>     M tests/Makefile.am
> 
>   Log Message:
>   -----------
>   tests: add a test for faulty handling of the x32 architecture
> 
> We currently allow calling close() on the x32 architecture when we're
> generating a blacklist filter for x86 and x86_64, i.e. one with an
> ALLOW policy. We shouldn't as the default handling for unsupported
> architectures should be defined by the bad_arch handling -- not the
> default policy.
> 
> The reason for the faulty behaviour is the wrong jump target for the
> x32 architecture test. It should jump to the KILL label, not the next
> architecture test instruction. That one won't test the architecture
> any more as the accumulator register was already overwritten with the
> syscall number for the x32 test.
> 
> This test generates a filter that should return ERRNO(1) on calls to
> close() for supported architectures or KILL on unsupported ones. But,
> currently, does not do so for x32 and ALLOWs the syscall instead.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> [PM: added a python version of the test]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 8868f7eb0c343cfcb9bbe28736928a7f7e108b97
>       
> https://github.com/seccomp/libseccomp/commit/8868f7eb0c343cfcb9bbe28736928a7f7e108b97
>   Author: Mathias Krause' via libseccomp <[email protected]>
>   Date:   2015-06-15 (Mon, 15 Jun 2015)
> 
>   Changed paths:
>     M src/gen_bpf.c
>     M tests/28-sim-arch_x86.c
>     M tests/28-sim-arch_x86.tests
> 
>   Log Message:
>   -----------
>   bpf: fix x32/x86_64 architecture detection logic
> 
> Test 28-sim-arch_x86 points out a flaw in the x32 arch handling as we
> wrongly jump to the next architecture check while we should jump to the
> bad_arch handling instruction instead. See below:
> 
> $ ./tests/28-sim-arch_x86 -b | ./tools/scmp_bpf_disasm
>  line  OP   JT   JF   K
> =================================
>  0000: 0x20 0x00 0x00 0x00000004   ld  $data[4]
>  0001: 0x15 0x00 0x03 0xc000003e   jeq 3221225534 true:0002 false:0005
>  0002: 0x20 0x00 0x00 0x00000000   ld  $data[0]
>  0003: 0x35 0x01 0x00 0x40000000   jge 1073741824 true:0005 false:0004
>  0004: 0x15 0x04 0x03 0x00000003   jeq 3    true:0009 false:0008
>  0005: 0x15 0x00 0x04 0x40000003   jeq 1073741827 true:0006 false:0010
>  0006: 0x20 0x00 0x00 0x00000000   ld  $data[0]
>  0007: 0x15 0x01 0x00 0x00000006   jeq 6    true:0009 false:0008
>  0008: 0x06 0x00 0x00 0x7fff0000   ret ALLOW
>  0009: 0x06 0x00 0x00 0x00050001   ret ERRNO(1)
>  0010: 0x06 0x00 0x00 0x00000000   ret KILL
> 
> When we reach the test at 0003 the accumulator register was changed
> from holding the audit architecture to contain the syscall number
> instead. This is needed to actually test for the x32 sub-architecture
> as it, unfortunately, got no dedicated audit arch value. However, if
> that test succeeds, we end up jumping to the next architecture check
> at 0005 which is wrong. We should jump to the bad_arch handling at
> 0010 instead as x32 is an unsupported architecture for that test
> program. Even worse, the next architecture check now operates on the
> wrong data as it's no longer testing the audit arch but the syscall
> number instead. As it happen to be, the syscall number for x32's
> close() is 0x40000003. That exactly matches the audit arch value for
> the x86 architecture. So what this filter does is allowing the x32
> close() call while it should not.
> 
> As we already successfully checked the arch to be SCMP_ARCH_X86_64 in
> 0001 it cannot have a different value. Testing for other values just
> makes no sense. So instead of reloading the accumulator register on a
> successful x32 test fix this by jumping to the bad_arch handling block
> instead.
> 
> The generated BPF program now looks as follows:
> 
> $ ./tests/28-sim-arch_x86 -b | ./tools/scmp_bpf_disasm
>  line  OP   JT   JF   K
> =================================
>  0000: 0x20 0x00 0x00 0x00000004   ld  $data[4]
>  0001: 0x15 0x00 0x03 0xc000003e   jeq 3221225534 true:0002 false:0005
>  0002: 0x20 0x00 0x00 0x00000000   ld  $data[0]
>  0003: 0x35 0x06 0x00 0x40000000   jge 1073741824 true:0010 false:0004
>  0004: 0x15 0x04 0x03 0x00000003   jeq 3    true:0009 false:0008
>  0005: 0x15 0x00 0x04 0x40000003   jeq 1073741827 true:0006 false:0010
>  0006: 0x20 0x00 0x00 0x00000000   ld  $data[0]
>  0007: 0x15 0x01 0x00 0x00000006   jeq 6    true:0009 false:0008
>  0008: 0x06 0x00 0x00 0x7fff0000   ret ALLOW
>  0009: 0x06 0x00 0x00 0x00050001   ret ERRNO(1)
>  0010: 0x06 0x00 0x00 0x00000000   ret KILL
> 
> It now correctly jumps to the bad_arch handling at 0010 when the x32
> test in 0003 succeeds.
> 
> This fixes test 28-sim-arch_x86.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> [PM: subject tweak, renamed 'bad_arch_hash' to 'bad_arch_hsh']
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: e46729f64af23c73ee43e93429a7db7b6ac9c002
>       
> https://github.com/seccomp/libseccomp/commit/e46729f64af23c73ee43e93429a7db7b6ac9c002
>   Author: Paul Moore <[email protected]>
>   Date:   2015-06-22 (Mon, 22 Jun 2015)
> 
>   Changed paths:
>     M tests/Makefile.am
> 
>   Log Message:
>   -----------
>   tests: add some tests missing from the Makefile
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 0cad182e971a06d61aeeacc7bd0d94be872e37b8
>       
> https://github.com/seccomp/libseccomp/commit/0cad182e971a06d61aeeacc7bd0d94be872e37b8
>   Author: Andrew Jones <[email protected]>
>   Date:   2015-07-01 (Wed, 01 Jul 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
> 
>   Log Message:
>   -----------
>   arm: fix arm-specific syscall symbols
> 
> The symbols are prefixed with __ARM_NR_, not __NR_. We still shoehorn
> the symbols into the __NR_ format for libseccomp though. Doing so keeps
> SCMP_SYS simple.
> 
> Signed-off-by: Andrew Jones <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 2876e1f8a76b9f18cf57bab089740223fc738408
>       
> https://github.com/seccomp/libseccomp/commit/2876e1f8a76b9f18cf57bab089740223fc738408
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-01 (Wed, 01 Jul 2015)
> 
>   Changed paths:
>     M src/arch-syscall-validate
> 
>   Log Message:
>   -----------
>   arch: update the syscall validate script to reflect changes in x86
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: cd50afa46dbae9a9adad42c61d1ed5cd69fa22ce
>       
> https://github.com/seccomp/libseccomp/commit/cd50afa46dbae9a9adad42c61d1ed5cd69fa22ce
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-01 (Wed, 01 Jul 2015)
> 
>   Changed paths:
>     M src/arch-syscall-validate
> 
>   Log Message:
>   -----------
>   arch: add the ability to dump the sycall definitions in 
> arch-syscall-validate
> 
> Also do some minor cleanup while we are touching the file.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 942401e44ed1330c35410979d7efc90baa9c5d5e
>       
> https://github.com/seccomp/libseccomp/commit/942401e44ed1330c35410979d7efc90baa9c5d5e
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-01 (Wed, 01 Jul 2015)
> 
>   Changed paths:
>     M tools/check-syntax
> 
>   Log Message:
>   -----------
>   tools: add the ability to fix syntax via the check-syntax tool
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: d7ccfb511b17e0e04ba98623946b1f09f1fc31ed
>       
> https://github.com/seccomp/libseccomp/commit/d7ccfb511b17e0e04ba98623946b1f09f1fc31ed
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-01 (Wed, 01 Jul 2015)
> 
>   Changed paths:
>     M CREDITS
> 
>   Log Message:
>   -----------
>   doc: update the CREDITS file
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 630c51b50ebb2bbc0cafadbda7c8f845acfcd6bd
>       
> https://github.com/seccomp/libseccomp/commit/630c51b50ebb2bbc0cafadbda7c8f845acfcd6bd
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-06 (Mon, 06 Jul 2015)
> 
>   Changed paths:
>     M src/db.h
> 
>   Log Message:
>   -----------
>   db: fix type of op in struct db_api_arg
> 
> No need to use unsigned int here, use the enum instead.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 62f1e7e2fa6163964322d232bde89e37478772e9
>       
> https://github.com/seccomp/libseccomp/commit/62f1e7e2fa6163964322d232bde89e37478772e9
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-06 (Mon, 06 Jul 2015)
> 
>   Changed paths:
>     M tests/12-sim-basic_masked_ops.tests
> 
>   Log Message:
>   -----------
>   tests: extend 12-sim-basic_masked_ops with 64 bit values
> 
> Add test vectors with bits set in the upper half of the syscall argument.
> They trigger a bug with mask values having the upper half set to 0. We
> accidentally emit a test for 0 in this case when we should not test the
> upper half at all.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: ccaf7d240c2fe034a323af2783ddec6297ae37e6
>       
> https://github.com/seccomp/libseccomp/commit/ccaf7d240c2fe034a323af2783ddec6297ae37e6
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-06 (Mon, 06 Jul 2015)
> 
>   Changed paths:
>     M src/db.c
> 
>   Log Message:
>   -----------
>   db: fix braino in _db_node_mask_fixup()
> 
> If the mask is 0 and we do a masked compare we shouldn't "optimize" this
> case to a compare against zero. "(arg & 0) eq 0" != "(arg & ~0) eq 0".
> The former is a tautology while the latter depends on the value of "arg".
> 
> Just mask "datum" instead to fix this bug. We'll do an unnecessary runtime
> test for the tautology in this case but follow up patches will take care
> of this.
> 
> This fixes the failing test cases of 12-sim-basic_masked_ops with 64 bit
> argument values.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 1ff6f3e6521d787e52fe328b862094898fc0b77e
>       
> https://github.com/seccomp/libseccomp/commit/1ff6f3e6521d787e52fe328b862094898fc0b77e
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-06 (Mon, 06 Jul 2015)
> 
>   Changed paths:
>     M src/db.c
> 
>   Log Message:
>   -----------
>   db: optimize masked compares
> 
> If the masked compare is a tautology we don't need to generate
> instructions for the runtime test. It'll always be true.
> 
> This patch handles the case for 32 bit arches and partially for 64 bit
> arches. The cases where either the upper half or the lower half is a
> tautology is still TODO.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> [PM: minor function name changes to better match existing style]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 6d41cd8b016728591b007014d1460adae54211a1
>       
> https://github.com/seccomp/libseccomp/commit/6d41cd8b016728591b007014d1460adae54211a1
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-06 (Mon, 06 Jul 2015)
> 
>   Changed paths:
>     M CHANGELOG
> 
>   Log Message:
>   -----------
>   all: update CHANGELOG and version info for v2.2.2
> 
> Also correct some typos in the existing CHANGELOG entries.
> 
> Signed-off-by: Paul Moore <[email protected]>
> (imported from commit d7a29fefb03d9c3658854ea7b3cb6a8f082cfb90)
> 
> 
>   Commit: bca4e115715174a64c7b5f56430a51f3e676c34a
>       
> https://github.com/seccomp/libseccomp/commit/bca4e115715174a64c7b5f56430a51f3e676c34a
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-08 (Wed, 08 Jul 2015)
> 
>   Changed paths:
>     M tests/12-sim-basic_masked_ops.tests
> 
>   Log Message:
>   -----------
>   tests: workaround problems with large integers on 32-bit ARM
> 
> See the mailing list thread below:
> 
>  -> https://groups.google.com/forum/#!topic/libseccomp/VtrClkXxLGA
> 
> ... unfortunately the 32-bit ARM userspace has problems with this
> particular test so we need to disable it for the time being.  It is
> important to note that this is only a problem with the test and not
> with libseccomp in general.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: b104193d48d479b7e342c292ddcae0133575f68a
>       
> https://github.com/seccomp/libseccomp/commit/b104193d48d479b7e342c292ddcae0133575f68a
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-08 (Wed, 08 Jul 2015)
> 
>   Changed paths:
>     M CHANGELOG
> 
>   Log Message:
>   -----------
>   all: update CHANGELOG and version info for v2.2.3
> 
> Signed-off-by: Paul Moore <[email protected]>
> (imported from commit 7932b4fa24c1add0d7a315de8387d216334fbcf7)
> 
> 
>   Commit: 02030ce9920181bc1058990ecaefaa754de9ad3a
>       
> https://github.com/seccomp/libseccomp/commit/02030ce9920181bc1058990ecaefaa754de9ad3a
>   Author: Jan Willeke <[email protected]>
>   Date:   2015-07-13 (Mon, 13 Jul 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     A src/arch-s390x-syscalls.c
>     A src/arch-s390x.c
>     A src/arch-s390x.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
>     M src/arch.c
>     M src/gen_pfc.c
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/regression
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   arch: add support for s390x
> 
> This patch adds support for S390x (64-bit) architecture.
> 
> Signed-off-by: Jan Willeke <[email protected]>
> [PM: rewrote the subject line, style fixes]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: acc895703daf72d6c9a83db2b7a0f8ff73b37ad5
>       
> https://github.com/seccomp/libseccomp/commit/acc895703daf72d6c9a83db2b7a0f8ff73b37ad5
>   Author: Jan Willeke <[email protected]>
>   Date:   2015-07-13 (Mon, 13 Jul 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     A src/arch-s390-syscalls.c
>     A src/arch-s390.c
>     A src/arch-s390.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
>     M src/arch.c
>     M src/gen_pfc.c
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/regression
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   arch: add support for s390
> 
> This patch adds support for S390 (32-bit) architecture.
> 
> Signed-off-by: Jan Willeke <[email protected]>
> [PM: rewrote the subject line, style fixes, s390x/s390 typo bugfixes]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: c5d3e1d692710cca958ea218660c1877245fce67
>       
> https://github.com/seccomp/libseccomp/commit/c5d3e1d692710cca958ea218660c1877245fce67
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-13 (Mon, 13 Jul 2015)
> 
>   Changed paths:
>     M src/python/libseccomp.pxd
>     M src/python/seccomp.pyx
>     M tests/26-sim-arch_all_be_basic.py
> 
>   Log Message:
>   -----------
>   python: add s390 and s390x support
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: d7ba987a20581f324a5197154db694c1fe46429f
>       
> https://github.com/seccomp/libseccomp/commit/d7ba987a20581f324a5197154db694c1fe46429f
>   Author: Jan Willeke <[email protected]>
>   Date:   2015-07-13 (Mon, 13 Jul 2015)
> 
>   Changed paths:
>     M src/arch.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   s390x: fix plattform detection
> 
> Because on S390x both __s390x__ and __s390__ are defined, the check
> of __s390x__ must be before __s390__.
> 
> Signed-off-by: Jan Willeke <[email protected]>
> [PM: subject tweaks]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: bfac175ac1222ca59045eeecd8d27df9dd7bab4d
>       
> https://github.com/seccomp/libseccomp/commit/bfac175ac1222ca59045eeecd8d27df9dd7bab4d
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-16 (Thu, 16 Jul 2015)
> 
>   Changed paths:
>     M tests/.gitignore
>     M tests/Makefile.am
>     A tests/miniseq.c
>     M tests/regression
> 
>   Log Message:
>   -----------
>   tests: fix sequence number generation
> 
> Because of incorrect number sequence generation by seq(1) on at least 32
> bit ARM systems using coreutils v8.23/v8.24 we provide a minimal seq(1)
> implementation that fits our needs.
> 
> This fixes the bug mentioned in the following mailing thread:
> 
>   https://groups.google.com/forum/#!topic/libseccomp/VtrClkXxLGA
> 
> Signed-off-by: Mathias Krause <[email protected]>
> [PM: subject line, build locations, and vertical whitespace tweaks]
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: bd70605cd4f8ad0ceb87e10dc261abace4f500a7
>       
> https://github.com/seccomp/libseccomp/commit/bd70605cd4f8ad0ceb87e10dc261abace4f500a7
>   Author: Mathias Krause <[email protected]>
>   Date:   2015-07-16 (Thu, 16 Jul 2015)
> 
>   Changed paths:
>     M tests/12-sim-basic_masked_ops.tests
> 
>   Log Message:
>   -----------
>   Revert "tests: workaround problems with large integers on 32-bit ARM"
> 
> This reverts commit bca4e115715174a64c7b5f56430a51f3e676c34a.
> 
> Now, since we're using a sane sequence number generator, we can
> re-enable the problematic test.
> 
> Signed-off-by: Mathias Krause <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 62c59aab8d72787c5055f704660a132a0b83386b
>       
> https://github.com/seccomp/libseccomp/commit/62c59aab8d72787c5055f704660a132a0b83386b
>   Author: Paul Moore <[email protected]>
>   Date:   2015-07-17 (Fri, 17 Jul 2015)
> 
>   Changed paths:
>     M tests/Makefile.am
> 
>   Log Message:
>   -----------
>   tests: don't link miniseq with any of our libraries
> 
> When merging bfac175ac1222ca59045eeecd8d27df9dd7bab4d ("tests: fix
> sequence number generation") I mistakenly removed a line from the
> patch which kept us from linking miniseq with the various libseccomp
> libraries.
> 
> Mathias did it correctly, I screwed it up; this patch should put
> things right.
> 
> Reported-by: Mathias Krause <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 29753076fddfed772511c67887bed1f0621b32cf
>       
> https://github.com/seccomp/libseccomp/commit/29753076fddfed772511c67887bed1f0621b32cf
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-05 (Wed, 05 Aug 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     A src/arch-ppc-syscalls.c
>     A src/arch-ppc.c
>     A src/arch-ppc.h
>     A src/arch-ppc64-syscalls.c
>     A src/arch-ppc64.c
>     A src/arch-ppc64.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
>     M src/arch.c
>     M src/python/libseccomp.pxd
>     M src/python/seccomp.pyx
>     M tests/16-sim-arch_basic.c
>     M tests/16-sim-arch_basic.py
>     M tests/23-sim-arch_all_le_basic.c
>     M tests/23-sim-arch_all_le_basic.py
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/26-sim-arch_all_be_basic.py
>     M tests/regression
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_disasm.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
>     M tools/util.h
> 
>   Log Message:
>   -----------
>   Merge branch 'working-ppc64'
> 
> Mike Strosaker <[email protected]> reports that the
> working-ppc64 branch is working for both 'make check' and './regression
> -T live'.
> 
> 
>   Commit: 18c7d1176fb236d98656eb4f4cd0343ebcfe5cc0
>       
> https://github.com/seccomp/libseccomp/commit/18c7d1176fb236d98656eb4f4cd0343ebcfe5cc0
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-05 (Wed, 05 Aug 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     M src/arch-ppc-syscalls.c
>     M src/arch-ppc64-syscalls.c
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
> 
>   Log Message:
>   -----------
>   arch: update the syscall tables for 4.2-rc5
> 
> The only update this time around is "switch_endian" for ppc.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: e10a7bdc29f1e7a3bc42ed213be23150ffad7d73
>       
> https://github.com/seccomp/libseccomp/commit/e10a7bdc29f1e7a3bc42ed213be23150ffad7d73
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-05 (Wed, 05 Aug 2015)
> 
>   Changed paths:
>     M README
> 
>   Log Message:
>   -----------
>   doc: include some direct subscription links for our mailing list
> 
> As suggested by Nikos Mavrogiannopoulos.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: a06972c8f7a287b83d3d5237f83b17ec2ab2047e
>       
> https://github.com/seccomp/libseccomp/commit/a06972c8f7a287b83d3d5237f83b17ec2ab2047e
>   Author: Jan Willeke <[email protected]>
>   Date:   2015-08-06 (Thu, 06 Aug 2015)
> 
>   Changed paths:
>     M tests/20-live-basic_die.py
>     M tests/21-live-basic_allow.py
> 
>   Log Message:
>   -----------
>   s390x: fix python tests
> 
> The s390 glib c uses more / different syscalls,
> thus the test have to allow more to work on s390.
> 
> Signed-off-by: Jan Willeke <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: a76904d09b63c5888088dd50c2a409f938fe9062
>       
> https://github.com/seccomp/libseccomp/commit/a76904d09b63c5888088dd50c2a409f938fe9062
>   Author: David Drysdale <[email protected]>
>   Date:   2015-08-12 (Wed, 12 Aug 2015)
> 
>   Changed paths:
>     M tools/scmp_bpf_disasm.c
> 
>   Log Message:
>   -----------
>   tools: add Dot output option to scmp_bpf_disasm
> 
> Generate a rough program flowchart when '-d' option specified.
> This output can be converted into a graph with the Dot tool:
> 
> % tests/02-sim-basic -b | tools/scmp_bpf_disasm -d | dot -Tpdf > out.pdf
> 
> Details:
>  - Add '-d' option to generate Dot output rather than listing.
>  - Convert bpf_decode_op() to return string rather than printing,
>    to allow re-use.
>  - Encapsulate action string generation in bpf_decode_action() to
>    allow re-use.
> 
> Signed-off-by: David Drysdale <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 641cc809f5699fede96a76821de6fed8b7375c73
>       
> https://github.com/seccomp/libseccomp/commit/641cc809f5699fede96a76821de6fed8b7375c73
>   Author: David Drysdale <[email protected]>
>   Date:   2015-08-12 (Wed, 12 Aug 2015)
> 
>   Changed paths:
>     M tools/scmp_bpf_disasm.c
> 
>   Log Message:
>   -----------
>   tools: support more LD modes in disassembler
> 
> Add support for other modes for LD/LDX operations
> (even though they are rare in seccomp BPF programs),
> specifically BPF_IMM, BPF_IND, BPF_LEN and BPF_MSH.
> 
> Signed-off-by: David Drysdale <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 53f504711dbc2feaeae139df3e0c28b960168ccf
>       
> https://github.com/seccomp/libseccomp/commit/53f504711dbc2feaeae139df3e0c28b960168ccf
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-12 (Wed, 12 Aug 2015)
> 
>   Changed paths:
>     M tools/scmp_bpf_disasm.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
>     M tools/util.h
> 
>   Log Message:
>   -----------
>   tools: eliminate the shared exit_usage() function
> 
> I'm still not quite sure why this was shared in the first place.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 9b3d08d90c40e4fbc4882e0be9585b7673d12a5e
>       
> https://github.com/seccomp/libseccomp/commit/9b3d08d90c40e4fbc4882e0be9585b7673d12a5e
>   Author: Mike Frysinger <[email protected]>
>   Date:   2015-08-24 (Mon, 24 Aug 2015)
> 
>   Changed paths:
>     M configure.ac
> 
>   Log Message:
>   -----------
>   build: fix == bashism
> 
> The test tool only has = for comparison, not ==.  The latter is accepted
> by bash and other shells, but is not in POSIX.
> 
> Signed-off-by: Mike Frysinger <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 8224c0c181ff7dd6383cd18ce9b4e168ad8c9ff0
>       
> https://github.com/seccomp/libseccomp/commit/8224c0c181ff7dd6383cd18ce9b4e168ad8c9ff0
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-26 (Wed, 26 Aug 2015)
> 
>   Changed paths:
>     M src/gen_bpf.c
> 
>   Log Message:
>   -----------
>   all: minor tweak to make astyle v2.05.1 happy
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 1d63fad4a064b80e0b921b16ed419f3342337ed4
>       
> https://github.com/seccomp/libseccomp/commit/1d63fad4a064b80e0b921b16ed419f3342337ed4
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-27 (Thu, 27 Aug 2015)
> 
>   Changed paths:
>     M src/api.c
> 
>   Log Message:
>   -----------
>   arch: fix a problem with the rule rewrites in _seccomp_rule_add()
> 
> A typo was causing the return value from arch_fitler_rewrite() to be
> ignored in cases where -EDOM was returned.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 51c46f80c1edee863bbc4eb21b03decc44e69a45
>       
> https://github.com/seccomp/libseccomp/commit/51c46f80c1edee863bbc4eb21b03decc44e69a45
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-27 (Thu, 27 Aug 2015)
> 
>   Changed paths:
>     M src/api.c
>     M src/arch-x86.c
>     M src/arch-x86.h
>     M src/arch.c
>     M src/arch.h
>     M src/db.c
>     M src/db.h
>     M tests/.gitignore
>     A tests/29-sim-pseudo_syscall.c
>     A tests/29-sim-pseudo_syscall.py
>     A tests/29-sim-pseudo_syscall.tests
>     M tests/Makefile.am
> 
>   Log Message:
>   -----------
>   all: block negative syscall numbers from the filter
> 
> We use negative syscalls numbers to indicate syscalls that aren't
> supported by a certain arch/ABI and unfortunately there were cases
> where these bogus syscall values were finding their way into the
> filter.  This patch corrects this and adds a new test to check for
> this in the future.
> 
> Reported-by: Mike Frysinger <[email protected]>
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: 6e26af4f027f6d6d3c8045f3b2c57b2255e911e3
>       
> https://github.com/seccomp/libseccomp/commit/6e26af4f027f6d6d3c8045f3b2c57b2255e911e3
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-27 (Thu, 27 Aug 2015)
> 
>   Changed paths:
>     M tests/regression
> 
>   Log Message:
>   -----------
>   tests: fix miniseq and "make distcheck"
> 
> This is a bit of a hack, but it works; fix it later.
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: fc886cbe8128e8544f5d197dfd0971403ee203b5
>       
> https://github.com/seccomp/libseccomp/commit/fc886cbe8128e8544f5d197dfd0971403ee203b5
>   Author: Paul Moore <[email protected]>
>   Date:   2015-08-28 (Fri, 28 Aug 2015)
> 
>   Changed paths:
>     M include/seccomp.h.in
>     M src/Makefile.am
>     M src/arch-aarch64-syscalls.c
>     M src/arch-arm-syscalls.c
>     M src/arch-mips-syscalls.c
>     M src/arch-mips64-syscalls.c
>     M src/arch-mips64n32-syscalls.c
>     M src/arch-ppc-syscalls.c
>     M src/arch-ppc64-syscalls.c
>     A src/arch-s390-syscalls.c
>     A src/arch-s390.c
>     A src/arch-s390.h
>     A src/arch-s390x-syscalls.c
>     A src/arch-s390x.c
>     A src/arch-s390x.h
>     M src/arch-syscall-check.c
>     M src/arch-syscall-dump.c
>     M src/arch-syscall-validate
>     M src/arch-x32-syscalls.c
>     M src/arch-x86-syscalls.c
>     M src/arch-x86_64-syscalls.c
>     M src/arch.c
>     M src/gen_pfc.c
>     M src/python/libseccomp.pxd
>     M src/python/seccomp.pyx
>     M tests/20-live-basic_die.py
>     M tests/21-live-basic_allow.py
>     M tests/26-sim-arch_all_be_basic.c
>     M tests/26-sim-arch_all_be_basic.py
>     M tests/regression
>     M tools/scmp_arch_detect.c
>     M tools/scmp_bpf_sim.c
>     M tools/util.c
> 
>   Log Message:
>   -----------
>   Merge branch 'working-s390' into master
> 
> Signed-off-by: Paul Moore <[email protected]>
> 
> 
>   Commit: a8fe571909e381b34d0ae0237aad71513f8739de
>       
> https://github.com/seccomp/libseccomp/commit/a8fe571909e381b34d0ae0237aad71513f8739de
>   Author: Mike Frysinger <[email protected]>
>   Date:   2015-08-28 (Fri, 28 Aug 2015)
> 
>   Changed paths:
>     M src/gen_pfc.c
> 
>   Log Me...
x86_64 calling convention also supported for orbis under kfreebsd 9.0 
debian jessie release candidate revision 3

-- 
You received this message because you are subscribed to the Google Groups 
"libseccomp" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to