Branch: refs/heads/release-2.4

  Home:   https://github.com/seccomp/libseccomp

  Commit: 0db8babb27eed3ce202d54ec1cd99f23367631cf

      
https://github.com/seccomp/libseccomp/commit/0db8babb27eed3ce202d54ec1cd99f23367631cf

  Author: Paul Moore <[email protected]>

  Date:   2019-11-04 (Mon, 04 Nov 2019)



  Changed paths:

    A include/seccomp-syscalls.h

    M include/seccomp.h.in

    M tools/check-syntax



  Log Message:

  -----------

  api: stop defining __NR_x values for syscalls that don't exist



Historically libseccomp has created a __NR_x definition for every

syscall it supports, even those that aren't valid for a given ABI.

While this seemed like a good idea at the time, it turned out to have

some unwanted and nasty side effects.  This patch finally corrects

this problem.



The basic approach is quite simple: move the SCMP_SYS() macro to use

__SNR_x values instead of __NR_x values.  The unfortunate side effect

of this change is that instead of just worrying about #defines for the

__PNR_x values we now have to have a __SNR_x define for *every*

syscall.  The good news is that after this patch that should only be

a few new syscalls every year - a very manageable task.



Reviewed-by: Tom Hromatka <[email protected]>

Signed-off-by: Paul Moore <[email protected]>

(cherry picked from commit bf162816a6e42d7a40e54aadc18d1a98c34ca971)

Signed-off-by: Tom Hromatka <[email protected]>

Acked-by: Paul Moore <[email protected]>





  Commit: 80177ff2684664c9c51be838275711f00daf5d0c

      
https://github.com/seccomp/libseccomp/commit/80177ff2684664c9c51be838275711f00daf5d0c

  Author: Stéphane Graber <[email protected]>

  Date:   2019-11-04 (Mon, 04 Nov 2019)



  Changed paths:

    M include/Makefile.am



  Log Message:

  -----------

  build: ship seccomp-syscalls.h



Without this, anything which includes "seccomp.h" will fail when using a build 
version of libseccomp.



Signed-off-by: Stéphane Graber <[email protected]>

Acked-by: Tom Hromatka <[email protected]>

[PM: tweaked the subject line]

Signed-off-by: Paul Moore <[email protected]>



(cherry picked from commit c95cdadef8746f9b4c714443e74e364f8fc7f10c)

Signed-off-by: Tom Hromatka <[email protected]>

Acked-by: Paul Moore <[email protected]>





  Commit: 1da87024a13c94453b9a07751a28d9291759904a

      
https://github.com/seccomp/libseccomp/commit/1da87024a13c94453b9a07751a28d9291759904a

  Author: Paul Moore <[email protected]>

  Date:   2019-11-04 (Mon, 04 Nov 2019)



  Changed paths:

    M tools/Makefile.am



  Log Message:

  -----------

  tools: fix a problem with distcheck



We shouldn't be redefining AM_CPPFLAGS here, so get rid of it.



Reported-by: Tom Hromatka <[email protected]>

Acked-by: Tom Hromatka <[email protected]>

Signed-off-by: Paul Moore <[email protected]>

(cherry picked from commit ae19647048b38ad6d2ab0f2ac0db4dc1e9be1f7d)

Signed-off-by: Tom Hromatka <[email protected]>

Acked-by: Paul Moore <[email protected]>





  Commit: be65b26b67099be2b2b4890d736dbd1ad15adf36

      
https://github.com/seccomp/libseccomp/commit/be65b26b67099be2b2b4890d736dbd1ad15adf36

  Author: Paul Moore <[email protected]>

  Date:   2019-11-04 (Mon, 04 Nov 2019)



  Changed paths:

    M include/seccomp-syscalls.h

    M src/arch-aarch64-syscalls.c

    M src/arch-arm-syscalls.c

    M src/arch-mips-syscalls.c

    M src/arch-mips64-syscalls.c

    M src/arch-mips64n32-syscalls.c

    M src/arch-parisc-syscalls.c

    M src/arch-ppc-syscalls.c

    M src/arch-ppc64-syscalls.c

    M src/arch-s390-syscalls.c

    M src/arch-s390.c

    M src/arch-s390x-syscalls.c

    M src/arch-s390x.c

    M src/arch-x32-syscalls.c

    M src/arch-x86-syscalls.c

    M src/arch-x86.c

    M src/arch-x86_64-syscalls.c



  Log Message:

  -----------

  arch: update the internal syscall tables to Linux v5.4-rc4



This is long overdue so quite a few changes, including tweaks to

support some newly direct wired syscalls which were previously

multiplexed.



We really need to make sure we update the syscall table more often.



Acked-by: Tom Hromatka <[email protected]>

Signed-off-by: Paul Moore <[email protected]>

(cherry picked from commit bf747eb21e428c2b3ead6ebcca27951b681963a0)

Signed-off-by: Tom Hromatka <[email protected]>

Acked-by: Paul Moore <[email protected]>





  Commit: cce58b02986b6c65cbf3eda3d685c1f642a1a2c5

      
https://github.com/seccomp/libseccomp/commit/cce58b02986b6c65cbf3eda3d685c1f642a1a2c5

  Author: Tom Hromatka <[email protected]>

  Date:   2019-11-04 (Mon, 04 Nov 2019)



  Changed paths:

    M include/Makefile.am

    A include/seccomp-syscalls.h

    M include/seccomp.h.in

    M src/arch-aarch64-syscalls.c

    M src/arch-arm-syscalls.c

    M src/arch-mips-syscalls.c

    M src/arch-mips64-syscalls.c

    M src/arch-mips64n32-syscalls.c

    M src/arch-parisc-syscalls.c

    M src/arch-ppc-syscalls.c

    M src/arch-ppc64-syscalls.c

    M src/arch-s390-syscalls.c

    M src/arch-s390.c

    M src/arch-s390x-syscalls.c

    M src/arch-s390x.c

    M src/arch-x32-syscalls.c

    M src/arch-x86-syscalls.c

    M src/arch-x86.c

    M src/arch-x86_64-syscalls.c

    M tools/Makefile.am

    M tools/check-syntax



  Log Message:

  -----------

  Merge pull request #179 from drakenclimber/issues/161-round2



Backports to release-2.4 branch





Compare: 
https://github.com/seccomp/libseccomp/compare/0f11bb83d92a...cce58b02986b

-- 
You received this message because you are subscribed to the Google Groups 
"libseccomp" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/libseccomp/seccomp/libseccomp/push/refs/heads/release-2.4/0f11bb-cce58b%40github.com.

Reply via email to