Branch: refs/heads/master
  Home:   https://github.com/seccomp/libseccomp
  Commit: 34cde704979defcbddb8eea64295acf0e477c250
      
https://github.com/seccomp/libseccomp/commit/34cde704979defcbddb8eea64295acf0e477c250
  Author: Paul Moore <[email protected]>
  Date:   2020-08-18 (Tue, 18 Aug 2020)

  Changed paths:
    M src/arch-arm.c
    M src/arch-mips.c
    M src/arch-mips64.c
    M src/arch-mips64n32.c
    M src/arch-x32.c

  Log Message:
  -----------
  arch: ensure we don't "munge" pseudo syscall numbers

A number of arches/ABIs have either syscall offsets (the MIPS
family) or specific bits (x32) which are applied to their normal
syscall numbers.  We generally handle that via "munging" in
libseccomp, and it works reasonably well.  Unfortunately we were
applying this munging process to the negative pseudo syscall
numbers as well and this was causing problems.

This patch fixes the various offset/bit arches/ABIs by not applying
the munging to the negative pseudo syscall numbers.

This resolves GH issue #284:
* https://github.com/seccomp/libseccomp/issues/284

Reported-by: Harald van Dijk <[email protected]>
Acked-by: Tom Hromatka <[email protected]>
Signed-off-by: Paul Moore <[email protected]>


-- 
You received this message because you are subscribed to the Google Groups 
"libseccomp" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/libseccomp/seccomp/libseccomp/push/refs/heads/master/02812f-34cde7%40github.com.

Reply via email to