Branch: refs/heads/master
  Home:   https://github.com/seccomp/libseccomp
  Commit: 80a987d6f8d0152def07fa90ace6417d56eea741
      
https://github.com/seccomp/libseccomp/commit/80a987d6f8d0152def07fa90ace6417d56eea741
  Author: Paul Moore <[email protected]>
  Date:   2019-02-21 (Thu, 21 Feb 2019)

  Changed paths:
    M doc/man/man3/seccomp_rule_add.3
    M include/seccomp.h.in
    A tests/48-sim-32b_args.c
    A tests/48-sim-32b_args.py
    A tests/48-sim-32b_args.tests
    M tests/Makefile.am

  Log Message:
  -----------
  api: provide 32-bit friendly argument comparison macros

We have a longstanding issue with 32-bit to 64-bit sign extension
inadvertently resulting in bogus syscall argument extensions. This
patch introduces a new set of argument comparison macros which
limit the argument values to 32-bit values so that we don't run into
problems with sign extension.

We use the macro overloading proposed by Roman at
https://kecher.net/overloading-macros/ to retain the feature of these
macros being usable as static initializers.

Thanks to @jdstrand on GitHub for reporting the problem.

Signed-off-by: Paul Moore <[email protected]>
Signed-off-by: Michael Weiser <[email protected]>


-- 
You received this message because you are subscribed to the Google Groups 
"libseccomp" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to