On Tuesday, December 15, 2015 at 1:46:31 PM UTC-5, GitHub wrote: > Branch: refs/heads/master > Home: https://github.com/seccomp/libseccomp > Commit: 6d7b7c8e27b0cb2ba0470ff02917d1faba9430ba > > https://github.com/seccomp/libseccomp/commit/6d7b7c8e27b0cb2ba0470ff02917d1faba9430ba > Author: Paul Moore <[email protected]> > Date: 2015-02-06 (Fri, 06 Feb 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > A src/arch-ppc64-syscalls.c > A src/arch-ppc64.c > A src/arch-ppc64.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > M tools/util.h > > Log Message: > ----------- > arch: add a ppc64 syscall table > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: daed219e5df2e85f994b89a55f7271849367a7f1 > > https://github.com/seccomp/libseccomp/commit/daed219e5df2e85f994b89a55f7271849367a7f1 > Author: Paul Moore <[email protected]> > Date: 2015-02-06 (Fri, 06 Feb 2015) > > Changed paths: > M src/arch.c > M src/python/libseccomp.pxd > M src/python/seccomp.pyx > > Log Message: > ----------- > arch: add the basic initial support for ppc64 to the arch-dependent code > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 2176cdc71cc5dcc066879eeff5744d007bbce932 > > https://github.com/seccomp/libseccomp/commit/2176cdc71cc5dcc066879eeff5744d007bbce932 > Author: Paul Moore <[email protected]> > Date: 2015-02-06 (Fri, 06 Feb 2015) > > Changed paths: > M tools/scmp_arch_detect.c > M tools/scmp_bpf_disasm.c > M tools/scmp_bpf_sim.c > M tools/util.c > > Log Message: > ----------- > tools: add ppc64 support > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: c36a0c9b8c5ed81cea710827500b3de315c9609a > > https://github.com/seccomp/libseccomp/commit/c36a0c9b8c5ed81cea710827500b3de315c9609a > Author: Paul Moore <[email protected]> > Date: 2015-02-06 (Fri, 06 Feb 2015) > > Changed paths: > M tests/16-sim-arch_basic.c > M tests/16-sim-arch_basic.py > M tests/23-sim-arch_all_le_basic.c > M tests/23-sim-arch_all_le_basic.py > M tests/26-sim-arch_all_be_basic.c > M tests/26-sim-arch_all_be_basic.py > M tests/regression > > Log Message: > ----------- > tests: add ppc64 support to the regression tests > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 9432a8b64051ec477a602f38c7cf93ae7c1c987f > > https://github.com/seccomp/libseccomp/commit/9432a8b64051ec477a602f38c7cf93ae7c1c987f > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-10 (Tue, 10 Feb 2015) > > Changed paths: > M tests/regression > > Log Message: > ----------- > tests: add ppc64 support to the regression live tests > > Otherwise The live tests will fail with > > "ERROR arch ppc64 not supported" > > Send against the working-ppc64 branch. > > Signed-off-by: Bogdan Purcareata <[email protected]> > [PM: added ppc64le] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: d2a4f2f7c7c626bd995fee2967e1edad7b6a156c > > https://github.com/seccomp/libseccomp/commit/d2a4f2f7c7c626bd995fee2967e1edad7b6a156c > Author: Paul Moore <[email protected]> > Date: 2015-02-10 (Tue, 10 Feb 2015) > > Changed paths: > M src/arch-ppc64-syscalls.c > M src/arch-syscall-validate > > Log Message: > ----------- > ppc64: correct the ppc64 syscall table and validation script > > We didn't correctly take into account the __powerpc64__ define when > generating the ppc64 syscall table. This patch also updates the > syscall table to match Linux v3.19. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 19ef2ce199428c3f5088107ae9b9df4fce919d17 > > https://github.com/seccomp/libseccomp/commit/19ef2ce199428c3f5088107ae9b9df4fce919d17 > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-11 (Wed, 11 Feb 2015) > > Changed paths: > M src/arch-syscall-check.c > > Log Message: > ----------- > tests: minor fix in arch-syscall-check > > Sent against working-ppc64. > > Signed-off-by: Bogdan Purcareata <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 3a7054f43a0b8615b96ddc7036539cd10142cc4d > > https://github.com/seccomp/libseccomp/commit/3a7054f43a0b8615b96ddc7036539cd10142cc4d > Author: Paul Moore <[email protected]> > Date: 2015-02-12 (Thu, 12 Feb 2015) > > Changed paths: > M configure.ac > > Log Message: > ----------- > all: reset the version in the master branch to 0.0.0 > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 83e58d25b0785a957db1d8b4c46034ef386b46ed > > https://github.com/seccomp/libseccomp/commit/83e58d25b0785a957db1d8b4c46034ef386b46ed > Author: Paul Moore <[email protected]> > Date: 2015-02-12 (Thu, 12 Feb 2015) > > Changed paths: > M CHANGELOG > M CREDITS > M include/seccomp.h.in > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > > Log Message: > ----------- > Merge branch 'master' into working-ppc64 > > > Commit: 7a7a83a24491f636d422e951f9e0547caaa68967 > > https://github.com/seccomp/libseccomp/commit/7a7a83a24491f636d422e951f9e0547caaa68967 > Author: Paul Moore <[email protected]> > Date: 2015-02-13 (Fri, 13 Feb 2015) > > Changed paths: > M tools/util.h > > Log Message: > ----------- > tools: add the missing elf.h header file > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: c1a168dfb53defb637754de9d6837b8fcf3b0213 > > https://github.com/seccomp/libseccomp/commit/c1a168dfb53defb637754de9d6837b8fcf3b0213 > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-17 (Tue, 17 Feb 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > A src/arch-ppc-syscalls.c > A src/arch-ppc.c > A src/arch-ppc.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > > Log Message: > ----------- > arch: add a ppc syscall table > > Signed-off-by: Bogdan Purcareata <[email protected]> > [PM: slight reordering of ppc/ppc64 in header files and makefiles] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: a2ad734f9344406a898feb02462603bc4b0b3a81 > > https://github.com/seccomp/libseccomp/commit/a2ad734f9344406a898feb02462603bc4b0b3a81 > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-17 (Tue, 17 Feb 2015) > > Changed paths: > M src/arch.c > M src/python/libseccomp.pxd > M src/python/seccomp.pyx > > Log Message: > ----------- > arch: add basic initial ppc support to the arch-dependent code > > Signed-off-by: Bogdan Purcareata <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: b6cdaa0e09a2fe3e47b4272597c208a33464c20f > > https://github.com/seccomp/libseccomp/commit/b6cdaa0e09a2fe3e47b4272597c208a33464c20f > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-17 (Tue, 17 Feb 2015) > > Changed paths: > M tools/scmp_arch_detect.c > M tools/scmp_bpf_disasm.c > M tools/scmp_bpf_sim.c > M tools/util.c > > Log Message: > ----------- > tools: add ppc support > > Signed-off-by: Bogdan Purcareata <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 0843a460f72da50756432a021c387fe8a7ab0bd5 > > https://github.com/seccomp/libseccomp/commit/0843a460f72da50756432a021c387fe8a7ab0bd5 > Author: Bogdan Purcareata <[email protected]> > Date: 2015-02-17 (Tue, 17 Feb 2015) > > Changed paths: > M tests/26-sim-arch_all_be_basic.c > M tests/26-sim-arch_all_be_basic.py > M tests/regression > > Log Message: > ----------- > tests: add ppc support to the regression tests > > Signed-off-by: Bogdan Purcareata <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 5b813a7331dcadd5d8b63532df8d07cdf47a041e > > https://github.com/seccomp/libseccomp/commit/5b813a7331dcadd5d8b63532df8d07cdf47a041e > Author: Brian Cain <[email protected]> > Date: 2015-03-13 (Fri, 13 Mar 2015) > > Changed paths: > M tests/15-basic-resolver.c > > Log Message: > ----------- > tests: fixed leak in basic-resolver > > seccomp_syscall_resolve_num_arch() returns a string from strdup() that > needs to be reaped. I found this bug using clang and > address-sanitizer. > > Signed-off-by: Brian Cain <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 49419d82c80129323c78ad51a7fd7b317e511b5f > > https://github.com/seccomp/libseccomp/commit/49419d82c80129323c78ad51a7fd7b317e511b5f > Author: Brian Cain <[email protected]> > Date: 2015-03-20 (Fri, 20 Mar 2015) > > Changed paths: > M tests/02-sim-basic.py > M tests/03-sim-basic_chains.py > M tests/04-sim-multilevel_chains.py > M tests/18-sim-basic_whitelist.py > M tests/22-sim-basic_chains_array.py > M tests/25-sim-multilevel_chains_adv.py > > Log Message: > ----------- > tests: purge the heretical semicolons > > These were likely vestiges from the C implementation of the > corresponding tests. But in python, we've been liberated from the > bonds of semicolons, let us rejoice and instead serve our > new whitespace masters! > > Signed-off-by: Brian Cain <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 67de487698778eeabadf28687ce5df3c795fb511 > > https://github.com/seccomp/libseccomp/commit/67de487698778eeabadf28687ce5df3c795fb511 > Author: Brian Cain <[email protected]> > Date: 2015-03-30 (Mon, 30 Mar 2015) > > Changed paths: > M src/gen_pfc.c > > Log Message: > ----------- > pfc: fix some warnings > > Fixed a couple of warnings -- 'rc' was used-uninitialized IIRC and > missing enums from the switch. > > Signed-off-by: Brian Cain <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 4992bc217387c44dfbd9a4d290cdc42ba098b124 > > https://github.com/seccomp/libseccomp/commit/4992bc217387c44dfbd9a4d290cdc42ba098b124 > Author: Paul Moore <[email protected]> > Date: 2015-04-03 (Fri, 03 Apr 2015) > > Changed paths: > A tests/27-sim-bpf_blk_state.c > A tests/27-sim-bpf_blk_state.py > A tests/27-sim-bpf_blk_state.tests > M tests/Makefile.am > > Log Message: > ----------- > tests: test the bpf accumulator checking logic > > When building the BPF filter code we need to ensure that we take the > state of the BPF state machine accumulator into account. This test > creates a situation where the BPF filter code generator needs to > perform some extra work to ensure the accumulator state is correct. > > This test is based on a bug reproducer by Matthew Heon. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: b43a7dde03f96ce6a291eb58f620c5d2b7700b51 > > https://github.com/seccomp/libseccomp/commit/b43a7dde03f96ce6a291eb58f620c5d2b7700b51 > Author: Paul Moore <[email protected]> > Date: 2015-04-03 (Fri, 03 Apr 2015) > > Changed paths: > M src/gen_bpf.c > > Log Message: > ----------- > bpf: track accumulator state and reload it when necessary > > It turns out there are a few corner cases where we incorrectly > generate seccomp BPF due to poor accumulator state tracking for each > BPF instruction block. This patch adds accumulator state tracking > such that we know what any given instruction block expects from the > accumulator and what value it leaves in the accumulator when it is > finished. This allows us to veryify the accumulator state when > assembling the instruction blocks into the final BPF program and if > necessary we can insert accumulator load/mask instructions to > maintain the proper accumulator state. > > Reported-by: Matthew Heon <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: f530cb495857c3d9fcf9d82b74893aec9caa6053 > > https://github.com/seccomp/libseccomp/commit/f530cb495857c3d9fcf9d82b74893aec9caa6053 > Author: Paul Moore <[email protected]> > Date: 2015-04-03 (Fri, 03 Apr 2015) > > Changed paths: > M src/gen_bpf.c > > Log Message: > ----------- > bpf: fix a style-o > > That would be a type-o which results in bad style :) > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: d1019115acdc8460c9a1f8a878768001a3c32431 > > https://github.com/seccomp/libseccomp/commit/d1019115acdc8460c9a1f8a878768001a3c32431 > Author: Paul Moore <[email protected]> > Date: 2015-04-10 (Fri, 10 Apr 2015) > > Changed paths: > M include/seccomp.h.in > M src/arch-arm-syscalls.c > M src/arch-syscall-validate > > Log Message: > ----------- > arm: fix some problems with the syscall table > > The 32-bit ARM syscall table mistakenly included syscall definitions > for the syscalls below. This patch redefines those syscalls to > libseccomp's pseudo-syscall numbers and corrects the > arch-syscall-validate to correctly list the 32-bit ARM syscalls. > > * time > * umount > * stime > * alarm > * utime > * getrlimit > * select > * readdir > * mmap > * socketcall > * syscall > * ipc > > Reported-by: Andreas Farber <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: a710a2d246bdc73ba77e3ff5624e790688cc51fd > > https://github.com/seccomp/libseccomp/commit/a710a2d246bdc73ba77e3ff5624e790688cc51fd > Author: Paul Moore <[email protected]> > Date: 2015-05-06 (Wed, 06 May 2015) > > Changed paths: > M include/seccomp.h.in > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > M src/arch-syscall-validate > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > > Log Message: > ----------- > arm: add some missing syscalls > > Add the following syscalls to the ARM arch/ABI and update the syscall > validation script. > > * breakpoint() > * cacheflush() > * usr26() > * usr32() > * set_tls() > > Reported-by: Purcareata Bogdan <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: d32ef67e87ae4005e6456d17c071dbd410d957ea > > https://github.com/seccomp/libseccomp/commit/d32ef67e87ae4005e6456d17c071dbd410d957ea > Author: Paul Moore <[email protected]> > Date: 2015-05-06 (Wed, 06 May 2015) > > Changed paths: > M tests/.gitignore > > Log Message: > ----------- > build: update the .gitignore file under tests/ > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 4367b1b4f94ca1e0c0606ff85622f2ecb1a9c278 > > https://github.com/seccomp/libseccomp/commit/4367b1b4f94ca1e0c0606ff85622f2ecb1a9c278 > Author: Mike Strosaker <[email protected]> > Date: 2015-05-06 (Wed, 06 May 2015) > > Changed paths: > M src/python/seccomp.pyx > > Log Message: > ----------- > python: ensure attributes are treated as 32 bits > > Retrieving attributes using the Python bindings fails on some platforms. > The attributes are encoded in a 32-bit mask. Python variables are > usually larger (64 bits); Cython is not capable of recognizing that it > should only use a 32-bit number on every platform. This patch ensures > that the variable used to store the value of the attribute is only 32 bits. > > Signed-off-by: Michael Strosaker <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: f8de89b8764afa1e714e7b6d1c2247a655ed5470 > > https://github.com/seccomp/libseccomp/commit/f8de89b8764afa1e714e7b6d1c2247a655ed5470 > Author: Paul Moore <[email protected]> > Date: 2015-05-07 (Thu, 07 May 2015) > > Changed paths: > M include/seccomp.h.in > M tools/util.h > > Log Message: > ----------- > all: ensure the ARM and MIPS system defines are present > > On some really old systems the ELF and or Audit ABI/arch defines are > missing, this patch provides our own #defines in these cases. > > Reported-by: [email protected] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 0cd288bee5879af3aab6c447de55c90d4971e38c > > https://github.com/seccomp/libseccomp/commit/0cd288bee5879af3aab6c447de55c90d4971e38c > Author: Paul Moore <[email protected]> > Date: 2015-05-09 (Sat, 09 May 2015) > > Changed paths: > M src/api.c > M src/arch.c > M src/db.c > M src/gen_bpf.c > M src/hash.c > > Log Message: > ----------- > docs: fix a number of problems in the function header comments > > Reported-by: Brian Cain <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: c940cdf15b1c9f742949f422589ee1d0287e0db3 > > https://github.com/seccomp/libseccomp/commit/c940cdf15b1c9f742949f422589ee1d0287e0db3 > Author: Paul Moore <[email protected]> > Date: 2015-05-09 (Sat, 09 May 2015) > > Changed paths: > M README > > Log Message: > ----------- > doc: update the README based on feedback from the v2.2.0 release > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 21f4fa4c90fa57022f3494633871f2a74be22cdc > > https://github.com/seccomp/libseccomp/commit/21f4fa4c90fa57022f3494633871f2a74be22cdc > Author: Paul Moore <[email protected]> > Date: 2015-05-09 (Sat, 09 May 2015) > > Changed paths: > M CREDITS > > Log Message: > ----------- > doc: update the CREDITS file > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 4fe675fc2f62e7856d8992d23c51847129d47b22 > > https://github.com/seccomp/libseccomp/commit/4fe675fc2f62e7856d8992d23c51847129d47b22 > Author: Paul Moore <[email protected]> > Date: 2015-05-13 (Wed, 13 May 2015) > > Changed paths: > M CHANGELOG > > Log Message: > ----------- > all: update CHANGELOG and version info for v2.2.1 > > Signed-off-by: Paul Moore <[email protected]> > (imported from commit f506e0844372b2c404baa482defb62f6846d0e3e) > > > Commit: 37a609498a218c370e86d34470a21d0d98db3b4f > > https://github.com/seccomp/libseccomp/commit/37a609498a218c370e86d34470a21d0d98db3b4f > Author: Paul Moore <[email protected]> > Date: 2015-06-11 (Thu, 11 Jun 2015) > > Changed paths: > M tests/27-sim-bpf_blk_state.c > M tests/27-sim-bpf_blk_state.py > M tests/27-sim-bpf_blk_state.tests > > Log Message: > ----------- > tests: make 27-sim-bpf_blk_state architecture independent > > Using any of the socket related syscalls is always problematic, use > a generic syscall number for this test since it isn't syscall > specific. > > Reported-by: Jan Willeke <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 9b16b91c1293c3629529d288018415e309043daa > > https://github.com/seccomp/libseccomp/commit/9b16b91c1293c3629529d288018415e309043daa > Author: Colin Walters <[email protected]> > Date: 2015-06-12 (Fri, 12 Jun 2015) > > Changed paths: > M src/Makefile.am > M tools/Makefile.am > > Log Message: > ----------- > build: Fix srcdir != builddir from git > > See https://github.com/cgwalters/build-api/blob/master/build-api.md > > Signed-off-by: Colin Walters <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 25be15a99463286f1dcf8ba581ad9b94676db754 > > https://github.com/seccomp/libseccomp/commit/25be15a99463286f1dcf8ba581ad9b94676db754 > Author: Mathias Krause' via libseccomp <[email protected]> > Date: 2015-06-15 (Mon, 15 Jun 2015) > > Changed paths: > M tests/.gitignore > A tests/28-sim-arch_x86.c > A tests/28-sim-arch_x86.py > A tests/28-sim-arch_x86.tests > M tests/Makefile.am > > Log Message: > ----------- > tests: add a test for faulty handling of the x32 architecture > > We currently allow calling close() on the x32 architecture when we're > generating a blacklist filter for x86 and x86_64, i.e. one with an > ALLOW policy. We shouldn't as the default handling for unsupported > architectures should be defined by the bad_arch handling -- not the > default policy. > > The reason for the faulty behaviour is the wrong jump target for the > x32 architecture test. It should jump to the KILL label, not the next > architecture test instruction. That one won't test the architecture > any more as the accumulator register was already overwritten with the > syscall number for the x32 test. > > This test generates a filter that should return ERRNO(1) on calls to > close() for supported architectures or KILL on unsupported ones. But, > currently, does not do so for x32 and ALLOWs the syscall instead. > > Signed-off-by: Mathias Krause <[email protected]> > [PM: added a python version of the test] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 8868f7eb0c343cfcb9bbe28736928a7f7e108b97 > > https://github.com/seccomp/libseccomp/commit/8868f7eb0c343cfcb9bbe28736928a7f7e108b97 > Author: Mathias Krause' via libseccomp <[email protected]> > Date: 2015-06-15 (Mon, 15 Jun 2015) > > Changed paths: > M src/gen_bpf.c > M tests/28-sim-arch_x86.c > M tests/28-sim-arch_x86.tests > > Log Message: > ----------- > bpf: fix x32/x86_64 architecture detection logic > > Test 28-sim-arch_x86 points out a flaw in the x32 arch handling as we > wrongly jump to the next architecture check while we should jump to the > bad_arch handling instruction instead. See below: > > $ ./tests/28-sim-arch_x86 -b | ./tools/scmp_bpf_disasm > line OP JT JF K > ================================= > 0000: 0x20 0x00 0x00 0x00000004 ld $data[4] > 0001: 0x15 0x00 0x03 0xc000003e jeq 3221225534 true:0002 false:0005 > 0002: 0x20 0x00 0x00 0x00000000 ld $data[0] > 0003: 0x35 0x01 0x00 0x40000000 jge 1073741824 true:0005 false:0004 > 0004: 0x15 0x04 0x03 0x00000003 jeq 3 true:0009 false:0008 > 0005: 0x15 0x00 0x04 0x40000003 jeq 1073741827 true:0006 false:0010 > 0006: 0x20 0x00 0x00 0x00000000 ld $data[0] > 0007: 0x15 0x01 0x00 0x00000006 jeq 6 true:0009 false:0008 > 0008: 0x06 0x00 0x00 0x7fff0000 ret ALLOW > 0009: 0x06 0x00 0x00 0x00050001 ret ERRNO(1) > 0010: 0x06 0x00 0x00 0x00000000 ret KILL > > When we reach the test at 0003 the accumulator register was changed > from holding the audit architecture to contain the syscall number > instead. This is needed to actually test for the x32 sub-architecture > as it, unfortunately, got no dedicated audit arch value. However, if > that test succeeds, we end up jumping to the next architecture check > at 0005 which is wrong. We should jump to the bad_arch handling at > 0010 instead as x32 is an unsupported architecture for that test > program. Even worse, the next architecture check now operates on the > wrong data as it's no longer testing the audit arch but the syscall > number instead. As it happen to be, the syscall number for x32's > close() is 0x40000003. That exactly matches the audit arch value for > the x86 architecture. So what this filter does is allowing the x32 > close() call while it should not. > > As we already successfully checked the arch to be SCMP_ARCH_X86_64 in > 0001 it cannot have a different value. Testing for other values just > makes no sense. So instead of reloading the accumulator register on a > successful x32 test fix this by jumping to the bad_arch handling block > instead. > > The generated BPF program now looks as follows: > > $ ./tests/28-sim-arch_x86 -b | ./tools/scmp_bpf_disasm > line OP JT JF K > ================================= > 0000: 0x20 0x00 0x00 0x00000004 ld $data[4] > 0001: 0x15 0x00 0x03 0xc000003e jeq 3221225534 true:0002 false:0005 > 0002: 0x20 0x00 0x00 0x00000000 ld $data[0] > 0003: 0x35 0x06 0x00 0x40000000 jge 1073741824 true:0010 false:0004 > 0004: 0x15 0x04 0x03 0x00000003 jeq 3 true:0009 false:0008 > 0005: 0x15 0x00 0x04 0x40000003 jeq 1073741827 true:0006 false:0010 > 0006: 0x20 0x00 0x00 0x00000000 ld $data[0] > 0007: 0x15 0x01 0x00 0x00000006 jeq 6 true:0009 false:0008 > 0008: 0x06 0x00 0x00 0x7fff0000 ret ALLOW > 0009: 0x06 0x00 0x00 0x00050001 ret ERRNO(1) > 0010: 0x06 0x00 0x00 0x00000000 ret KILL > > It now correctly jumps to the bad_arch handling at 0010 when the x32 > test in 0003 succeeds. > > This fixes test 28-sim-arch_x86. > > Signed-off-by: Mathias Krause <[email protected]> > [PM: subject tweak, renamed 'bad_arch_hash' to 'bad_arch_hsh'] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: e46729f64af23c73ee43e93429a7db7b6ac9c002 > > https://github.com/seccomp/libseccomp/commit/e46729f64af23c73ee43e93429a7db7b6ac9c002 > Author: Paul Moore <[email protected]> > Date: 2015-06-22 (Mon, 22 Jun 2015) > > Changed paths: > M tests/Makefile.am > > Log Message: > ----------- > tests: add some tests missing from the Makefile > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 0cad182e971a06d61aeeacc7bd0d94be872e37b8 > > https://github.com/seccomp/libseccomp/commit/0cad182e971a06d61aeeacc7bd0d94be872e37b8 > Author: Andrew Jones <[email protected]> > Date: 2015-07-01 (Wed, 01 Jul 2015) > > Changed paths: > M include/seccomp.h.in > > Log Message: > ----------- > arm: fix arm-specific syscall symbols > > The symbols are prefixed with __ARM_NR_, not __NR_. We still shoehorn > the symbols into the __NR_ format for libseccomp though. Doing so keeps > SCMP_SYS simple. > > Signed-off-by: Andrew Jones <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 2876e1f8a76b9f18cf57bab089740223fc738408 > > https://github.com/seccomp/libseccomp/commit/2876e1f8a76b9f18cf57bab089740223fc738408 > Author: Paul Moore <[email protected]> > Date: 2015-07-01 (Wed, 01 Jul 2015) > > Changed paths: > M src/arch-syscall-validate > > Log Message: > ----------- > arch: update the syscall validate script to reflect changes in x86 > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: cd50afa46dbae9a9adad42c61d1ed5cd69fa22ce > > https://github.com/seccomp/libseccomp/commit/cd50afa46dbae9a9adad42c61d1ed5cd69fa22ce > Author: Paul Moore <[email protected]> > Date: 2015-07-01 (Wed, 01 Jul 2015) > > Changed paths: > M src/arch-syscall-validate > > Log Message: > ----------- > arch: add the ability to dump the sycall definitions in > arch-syscall-validate > > Also do some minor cleanup while we are touching the file. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 942401e44ed1330c35410979d7efc90baa9c5d5e > > https://github.com/seccomp/libseccomp/commit/942401e44ed1330c35410979d7efc90baa9c5d5e > Author: Paul Moore <[email protected]> > Date: 2015-07-01 (Wed, 01 Jul 2015) > > Changed paths: > M tools/check-syntax > > Log Message: > ----------- > tools: add the ability to fix syntax via the check-syntax tool > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: d7ccfb511b17e0e04ba98623946b1f09f1fc31ed > > https://github.com/seccomp/libseccomp/commit/d7ccfb511b17e0e04ba98623946b1f09f1fc31ed > Author: Paul Moore <[email protected]> > Date: 2015-07-01 (Wed, 01 Jul 2015) > > Changed paths: > M CREDITS > > Log Message: > ----------- > doc: update the CREDITS file > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 630c51b50ebb2bbc0cafadbda7c8f845acfcd6bd > > https://github.com/seccomp/libseccomp/commit/630c51b50ebb2bbc0cafadbda7c8f845acfcd6bd > Author: Mathias Krause <[email protected]> > Date: 2015-07-06 (Mon, 06 Jul 2015) > > Changed paths: > M src/db.h > > Log Message: > ----------- > db: fix type of op in struct db_api_arg > > No need to use unsigned int here, use the enum instead. > > Signed-off-by: Mathias Krause <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 62f1e7e2fa6163964322d232bde89e37478772e9 > > https://github.com/seccomp/libseccomp/commit/62f1e7e2fa6163964322d232bde89e37478772e9 > Author: Mathias Krause <[email protected]> > Date: 2015-07-06 (Mon, 06 Jul 2015) > > Changed paths: > M tests/12-sim-basic_masked_ops.tests > > Log Message: > ----------- > tests: extend 12-sim-basic_masked_ops with 64 bit values > > Add test vectors with bits set in the upper half of the syscall argument. > They trigger a bug with mask values having the upper half set to 0. We > accidentally emit a test for 0 in this case when we should not test the > upper half at all. > > Signed-off-by: Mathias Krause <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: ccaf7d240c2fe034a323af2783ddec6297ae37e6 > > https://github.com/seccomp/libseccomp/commit/ccaf7d240c2fe034a323af2783ddec6297ae37e6 > Author: Mathias Krause <[email protected]> > Date: 2015-07-06 (Mon, 06 Jul 2015) > > Changed paths: > M src/db.c > > Log Message: > ----------- > db: fix braino in _db_node_mask_fixup() > > If the mask is 0 and we do a masked compare we shouldn't "optimize" this > case to a compare against zero. "(arg & 0) eq 0" != "(arg & ~0) eq 0". > The former is a tautology while the latter depends on the value of "arg". > > Just mask "datum" instead to fix this bug. We'll do an unnecessary runtime > test for the tautology in this case but follow up patches will take care > of this. > > This fixes the failing test cases of 12-sim-basic_masked_ops with 64 bit > argument values. > > Signed-off-by: Mathias Krause <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 1ff6f3e6521d787e52fe328b862094898fc0b77e > > https://github.com/seccomp/libseccomp/commit/1ff6f3e6521d787e52fe328b862094898fc0b77e > Author: Mathias Krause <[email protected]> > Date: 2015-07-06 (Mon, 06 Jul 2015) > > Changed paths: > M src/db.c > > Log Message: > ----------- > db: optimize masked compares > > If the masked compare is a tautology we don't need to generate > instructions for the runtime test. It'll always be true. > > This patch handles the case for 32 bit arches and partially for 64 bit > arches. The cases where either the upper half or the lower half is a > tautology is still TODO. > > Signed-off-by: Mathias Krause <[email protected]> > [PM: minor function name changes to better match existing style] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 6d41cd8b016728591b007014d1460adae54211a1 > > https://github.com/seccomp/libseccomp/commit/6d41cd8b016728591b007014d1460adae54211a1 > Author: Paul Moore <[email protected]> > Date: 2015-07-06 (Mon, 06 Jul 2015) > > Changed paths: > M CHANGELOG > > Log Message: > ----------- > all: update CHANGELOG and version info for v2.2.2 > > Also correct some typos in the existing CHANGELOG entries. > > Signed-off-by: Paul Moore <[email protected]> > (imported from commit d7a29fefb03d9c3658854ea7b3cb6a8f082cfb90) > > > Commit: bca4e115715174a64c7b5f56430a51f3e676c34a > > https://github.com/seccomp/libseccomp/commit/bca4e115715174a64c7b5f56430a51f3e676c34a > Author: Paul Moore <[email protected]> > Date: 2015-07-08 (Wed, 08 Jul 2015) > > Changed paths: > M tests/12-sim-basic_masked_ops.tests > > Log Message: > ----------- > tests: workaround problems with large integers on 32-bit ARM > > See the mailing list thread below: > > -> https://groups.google.com/forum/#!topic/libseccomp/VtrClkXxLGA > > ... unfortunately the 32-bit ARM userspace has problems with this > particular test so we need to disable it for the time being. It is > important to note that this is only a problem with the test and not > with libseccomp in general. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: b104193d48d479b7e342c292ddcae0133575f68a > > https://github.com/seccomp/libseccomp/commit/b104193d48d479b7e342c292ddcae0133575f68a > Author: Paul Moore <[email protected]> > Date: 2015-07-08 (Wed, 08 Jul 2015) > > Changed paths: > M CHANGELOG > > Log Message: > ----------- > all: update CHANGELOG and version info for v2.2.3 > > Signed-off-by: Paul Moore <[email protected]> > (imported from commit 7932b4fa24c1add0d7a315de8387d216334fbcf7) > > > Commit: 02030ce9920181bc1058990ecaefaa754de9ad3a > > https://github.com/seccomp/libseccomp/commit/02030ce9920181bc1058990ecaefaa754de9ad3a > Author: Jan Willeke <[email protected]> > Date: 2015-07-13 (Mon, 13 Jul 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > A src/arch-s390x-syscalls.c > A src/arch-s390x.c > A src/arch-s390x.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > M src/arch.c > M src/gen_pfc.c > M tests/26-sim-arch_all_be_basic.c > M tests/regression > M tools/scmp_arch_detect.c > M tools/scmp_bpf_sim.c > M tools/util.c > > Log Message: > ----------- > arch: add support for s390x > > This patch adds support for S390x (64-bit) architecture. > > Signed-off-by: Jan Willeke <[email protected]> > [PM: rewrote the subject line, style fixes] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: acc895703daf72d6c9a83db2b7a0f8ff73b37ad5 > > https://github.com/seccomp/libseccomp/commit/acc895703daf72d6c9a83db2b7a0f8ff73b37ad5 > Author: Jan Willeke <[email protected]> > Date: 2015-07-13 (Mon, 13 Jul 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > A src/arch-s390-syscalls.c > A src/arch-s390.c > A src/arch-s390.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > M src/arch.c > M src/gen_pfc.c > M tests/26-sim-arch_all_be_basic.c > M tests/regression > M tools/scmp_arch_detect.c > M tools/scmp_bpf_sim.c > M tools/util.c > > Log Message: > ----------- > arch: add support for s390 > > This patch adds support for S390 (32-bit) architecture. > > Signed-off-by: Jan Willeke <[email protected]> > [PM: rewrote the subject line, style fixes, s390x/s390 typo bugfixes] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: c5d3e1d692710cca958ea218660c1877245fce67 > > https://github.com/seccomp/libseccomp/commit/c5d3e1d692710cca958ea218660c1877245fce67 > Author: Paul Moore <[email protected]> > Date: 2015-07-13 (Mon, 13 Jul 2015) > > Changed paths: > M src/python/libseccomp.pxd > M src/python/seccomp.pyx > M tests/26-sim-arch_all_be_basic.py > > Log Message: > ----------- > python: add s390 and s390x support > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: d7ba987a20581f324a5197154db694c1fe46429f > > https://github.com/seccomp/libseccomp/commit/d7ba987a20581f324a5197154db694c1fe46429f > Author: Jan Willeke <[email protected]> > Date: 2015-07-13 (Mon, 13 Jul 2015) > > Changed paths: > M src/arch.c > M tools/util.c > > Log Message: > ----------- > s390x: fix plattform detection > > Because on S390x both __s390x__ and __s390__ are defined, the check > of __s390x__ must be before __s390__. > > Signed-off-by: Jan Willeke <[email protected]> > [PM: subject tweaks] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: bfac175ac1222ca59045eeecd8d27df9dd7bab4d > > https://github.com/seccomp/libseccomp/commit/bfac175ac1222ca59045eeecd8d27df9dd7bab4d > Author: Mathias Krause <[email protected]> > Date: 2015-07-16 (Thu, 16 Jul 2015) > > Changed paths: > M tests/.gitignore > M tests/Makefile.am > A tests/miniseq.c > M tests/regression > > Log Message: > ----------- > tests: fix sequence number generation > > Because of incorrect number sequence generation by seq(1) on at least 32 > bit ARM systems using coreutils v8.23/v8.24 we provide a minimal seq(1) > implementation that fits our needs. > > This fixes the bug mentioned in the following mailing thread: > > https://groups.google.com/forum/#!topic/libseccomp/VtrClkXxLGA > > Signed-off-by: Mathias Krause <[email protected]> > [PM: subject line, build locations, and vertical whitespace tweaks] > Signed-off-by: Paul Moore <[email protected]> > > > Commit: bd70605cd4f8ad0ceb87e10dc261abace4f500a7 > > https://github.com/seccomp/libseccomp/commit/bd70605cd4f8ad0ceb87e10dc261abace4f500a7 > Author: Mathias Krause <[email protected]> > Date: 2015-07-16 (Thu, 16 Jul 2015) > > Changed paths: > M tests/12-sim-basic_masked_ops.tests > > Log Message: > ----------- > Revert "tests: workaround problems with large integers on 32-bit ARM" > > This reverts commit bca4e115715174a64c7b5f56430a51f3e676c34a. > > Now, since we're using a sane sequence number generator, we can > re-enable the problematic test. > > Signed-off-by: Mathias Krause <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 62c59aab8d72787c5055f704660a132a0b83386b > > https://github.com/seccomp/libseccomp/commit/62c59aab8d72787c5055f704660a132a0b83386b > Author: Paul Moore <[email protected]> > Date: 2015-07-17 (Fri, 17 Jul 2015) > > Changed paths: > M tests/Makefile.am > > Log Message: > ----------- > tests: don't link miniseq with any of our libraries > > When merging bfac175ac1222ca59045eeecd8d27df9dd7bab4d ("tests: fix > sequence number generation") I mistakenly removed a line from the > patch which kept us from linking miniseq with the various libseccomp > libraries. > > Mathias did it correctly, I screwed it up; this patch should put > things right. > > Reported-by: Mathias Krause <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 29753076fddfed772511c67887bed1f0621b32cf > > https://github.com/seccomp/libseccomp/commit/29753076fddfed772511c67887bed1f0621b32cf > Author: Paul Moore <[email protected]> > Date: 2015-08-05 (Wed, 05 Aug 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > A src/arch-ppc-syscalls.c > A src/arch-ppc.c > A src/arch-ppc.h > A src/arch-ppc64-syscalls.c > A src/arch-ppc64.c > A src/arch-ppc64.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > M src/arch.c > M src/python/libseccomp.pxd > M src/python/seccomp.pyx > M tests/16-sim-arch_basic.c > M tests/16-sim-arch_basic.py > M tests/23-sim-arch_all_le_basic.c > M tests/23-sim-arch_all_le_basic.py > M tests/26-sim-arch_all_be_basic.c > M tests/26-sim-arch_all_be_basic.py > M tests/regression > M tools/scmp_arch_detect.c > M tools/scmp_bpf_disasm.c > M tools/scmp_bpf_sim.c > M tools/util.c > M tools/util.h > > Log Message: > ----------- > Merge branch 'working-ppc64' > > Mike Strosaker <[email protected]> reports that the > working-ppc64 branch is working for both 'make check' and './regression > -T live'. > > > Commit: 18c7d1176fb236d98656eb4f4cd0343ebcfe5cc0 > > https://github.com/seccomp/libseccomp/commit/18c7d1176fb236d98656eb4f4cd0343ebcfe5cc0 > Author: Paul Moore <[email protected]> > Date: 2015-08-05 (Wed, 05 Aug 2015) > > Changed paths: > M include/seccomp.h.in > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > M src/arch-ppc-syscalls.c > M src/arch-ppc64-syscalls.c > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > > Log Message: > ----------- > arch: update the syscall tables for 4.2-rc5 > > The only update this time around is "switch_endian" for ppc. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: e10a7bdc29f1e7a3bc42ed213be23150ffad7d73 > > https://github.com/seccomp/libseccomp/commit/e10a7bdc29f1e7a3bc42ed213be23150ffad7d73 > Author: Paul Moore <[email protected]> > Date: 2015-08-05 (Wed, 05 Aug 2015) > > Changed paths: > M README > > Log Message: > ----------- > doc: include some direct subscription links for our mailing list > > As suggested by Nikos Mavrogiannopoulos. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: a06972c8f7a287b83d3d5237f83b17ec2ab2047e > > https://github.com/seccomp/libseccomp/commit/a06972c8f7a287b83d3d5237f83b17ec2ab2047e > Author: Jan Willeke <[email protected]> > Date: 2015-08-06 (Thu, 06 Aug 2015) > > Changed paths: > M tests/20-live-basic_die.py > M tests/21-live-basic_allow.py > > Log Message: > ----------- > s390x: fix python tests > > The s390 glib c uses more / different syscalls, > thus the test have to allow more to work on s390. > > Signed-off-by: Jan Willeke <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: a76904d09b63c5888088dd50c2a409f938fe9062 > > https://github.com/seccomp/libseccomp/commit/a76904d09b63c5888088dd50c2a409f938fe9062 > Author: David Drysdale <[email protected]> > Date: 2015-08-12 (Wed, 12 Aug 2015) > > Changed paths: > M tools/scmp_bpf_disasm.c > > Log Message: > ----------- > tools: add Dot output option to scmp_bpf_disasm > > Generate a rough program flowchart when '-d' option specified. > This output can be converted into a graph with the Dot tool: > > % tests/02-sim-basic -b | tools/scmp_bpf_disasm -d | dot -Tpdf > out.pdf > > Details: > - Add '-d' option to generate Dot output rather than listing. > - Convert bpf_decode_op() to return string rather than printing, > to allow re-use. > - Encapsulate action string generation in bpf_decode_action() to > allow re-use. > > Signed-off-by: David Drysdale <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 641cc809f5699fede96a76821de6fed8b7375c73 > > https://github.com/seccomp/libseccomp/commit/641cc809f5699fede96a76821de6fed8b7375c73 > Author: David Drysdale <[email protected]> > Date: 2015-08-12 (Wed, 12 Aug 2015) > > Changed paths: > M tools/scmp_bpf_disasm.c > > Log Message: > ----------- > tools: support more LD modes in disassembler > > Add support for other modes for LD/LDX operations > (even though they are rare in seccomp BPF programs), > specifically BPF_IMM, BPF_IND, BPF_LEN and BPF_MSH. > > Signed-off-by: David Drysdale <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 53f504711dbc2feaeae139df3e0c28b960168ccf > > https://github.com/seccomp/libseccomp/commit/53f504711dbc2feaeae139df3e0c28b960168ccf > Author: Paul Moore <[email protected]> > Date: 2015-08-12 (Wed, 12 Aug 2015) > > Changed paths: > M tools/scmp_bpf_disasm.c > M tools/scmp_bpf_sim.c > M tools/util.c > M tools/util.h > > Log Message: > ----------- > tools: eliminate the shared exit_usage() function > > I'm still not quite sure why this was shared in the first place. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 9b3d08d90c40e4fbc4882e0be9585b7673d12a5e > > https://github.com/seccomp/libseccomp/commit/9b3d08d90c40e4fbc4882e0be9585b7673d12a5e > Author: Mike Frysinger <[email protected]> > Date: 2015-08-24 (Mon, 24 Aug 2015) > > Changed paths: > M configure.ac > > Log Message: > ----------- > build: fix == bashism > > The test tool only has = for comparison, not ==. The latter is accepted > by bash and other shells, but is not in POSIX. > > Signed-off-by: Mike Frysinger <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 8224c0c181ff7dd6383cd18ce9b4e168ad8c9ff0 > > https://github.com/seccomp/libseccomp/commit/8224c0c181ff7dd6383cd18ce9b4e168ad8c9ff0 > Author: Paul Moore <[email protected]> > Date: 2015-08-26 (Wed, 26 Aug 2015) > > Changed paths: > M src/gen_bpf.c > > Log Message: > ----------- > all: minor tweak to make astyle v2.05.1 happy > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 1d63fad4a064b80e0b921b16ed419f3342337ed4 > > https://github.com/seccomp/libseccomp/commit/1d63fad4a064b80e0b921b16ed419f3342337ed4 > Author: Paul Moore <[email protected]> > Date: 2015-08-27 (Thu, 27 Aug 2015) > > Changed paths: > M src/api.c > > Log Message: > ----------- > arch: fix a problem with the rule rewrites in _seccomp_rule_add() > > A typo was causing the return value from arch_fitler_rewrite() to be > ignored in cases where -EDOM was returned. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 51c46f80c1edee863bbc4eb21b03decc44e69a45 > > https://github.com/seccomp/libseccomp/commit/51c46f80c1edee863bbc4eb21b03decc44e69a45 > Author: Paul Moore <[email protected]> > Date: 2015-08-27 (Thu, 27 Aug 2015) > > Changed paths: > M src/api.c > M src/arch-x86.c > M src/arch-x86.h > M src/arch.c > M src/arch.h > M src/db.c > M src/db.h > M tests/.gitignore > A tests/29-sim-pseudo_syscall.c > A tests/29-sim-pseudo_syscall.py > A tests/29-sim-pseudo_syscall.tests > M tests/Makefile.am > > Log Message: > ----------- > all: block negative syscall numbers from the filter > > We use negative syscalls numbers to indicate syscalls that aren't > supported by a certain arch/ABI and unfortunately there were cases > where these bogus syscall values were finding their way into the > filter. This patch corrects this and adds a new test to check for > this in the future. > > Reported-by: Mike Frysinger <[email protected]> > Signed-off-by: Paul Moore <[email protected]> > > > Commit: 6e26af4f027f6d6d3c8045f3b2c57b2255e911e3 > > https://github.com/seccomp/libseccomp/commit/6e26af4f027f6d6d3c8045f3b2c57b2255e911e3 > Author: Paul Moore <[email protected]> > Date: 2015-08-27 (Thu, 27 Aug 2015) > > Changed paths: > M tests/regression > > Log Message: > ----------- > tests: fix miniseq and "make distcheck" > > This is a bit of a hack, but it works; fix it later. > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: fc886cbe8128e8544f5d197dfd0971403ee203b5 > > https://github.com/seccomp/libseccomp/commit/fc886cbe8128e8544f5d197dfd0971403ee203b5 > Author: Paul Moore <[email protected]> > Date: 2015-08-28 (Fri, 28 Aug 2015) > > Changed paths: > M include/seccomp.h.in > M src/Makefile.am > M src/arch-aarch64-syscalls.c > M src/arch-arm-syscalls.c > M src/arch-mips-syscalls.c > M src/arch-mips64-syscalls.c > M src/arch-mips64n32-syscalls.c > M src/arch-ppc-syscalls.c > M src/arch-ppc64-syscalls.c > A src/arch-s390-syscalls.c > A src/arch-s390.c > A src/arch-s390.h > A src/arch-s390x-syscalls.c > A src/arch-s390x.c > A src/arch-s390x.h > M src/arch-syscall-check.c > M src/arch-syscall-dump.c > M src/arch-syscall-validate > M src/arch-x32-syscalls.c > M src/arch-x86-syscalls.c > M src/arch-x86_64-syscalls.c > M src/arch.c > M src/gen_pfc.c > M src/python/libseccomp.pxd > M src/python/seccomp.pyx > M tests/20-live-basic_die.py > M tests/21-live-basic_allow.py > M tests/26-sim-arch_all_be_basic.c > M tests/26-sim-arch_all_be_basic.py > M tests/regression > M tools/scmp_arch_detect.c > M tools/scmp_bpf_sim.c > M tools/util.c > > Log Message: > ----------- > Merge branch 'working-s390' into master > > Signed-off-by: Paul Moore <[email protected]> > > > Commit: a8fe571909e381b34d0ae0237aad71513f8739de > > https://github.com/seccomp/libseccomp/commit/a8fe571909e381b34d0ae0237aad71513f8739de > Author: Mike Frysinger <[email protected]> > Date: 2015-08-28 (Fri, 28 Aug 2015) > > Changed paths: > M src/gen_pfc.c > > Log Me... x86_64 calling convention also supported for orbis under kfreebsd 9.0 debian jessie release candidate revision 3
-- You received this message because you are subscribed to the Google Groups "libseccomp" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. For more options, visit https://groups.google.com/d/optout.
