Received: by 2002:a05:6622:f08:0:0:0:0 with SMTP id l8csp4255883ivc; Tue, 3 Nov 2020 07:09:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJygdr6rjlTjxHUnKgueclIAYrjbwSPCpebxucm0ay4e0XAwmohpb222a/4Jc8T8aH4vWZnh X-Received: by 2002:a17:906:3089:: with SMTP id 9mr8241044ejv.535.1604416158600; Tue, 03 Nov 2020 07:09:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604416158; cv=none; d=google.com; s=arc-20160816; b=Kq1BJUV3vzU0Ojq+qRXVKd3M5dYZK0PKPdZD3LHQb2ypPBOIjHSY67B4dW1F/QW9ww UtqWRrr68T2TmHn7eCza4G0+9TnCpBwTFbrmsVmjd1vG33+twdN22DNSQ5HNXRi9HiRR FTGGb0+H64fqex3Y7Xy54Ys3w996stl0k7eaFeQKFhpLXtmwIKOAvjjpYwZ4nVgJsbz3 lFHQWZJd5PoLVbw5hxLmqZ+UtV7PRv1aUeTVJz7Z7TzvICp2KuDU9DyGcriGk/ynDSem ZPUu8bG9lCREsDINgV4s4TmKONGUrujrncg3Db5/HlJ4j2WXEgBzFYdVrXZnD1Gl+i+w OpTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=NuvVFIz1waLGDaG9dEkSZCy9d5oJlorTkaPc9347MeEjOp3zdU6WzJw2q+t+9YtkWi /t/4crvf2el8y85yCyZgHCMWgN0IKJGGf1cYstmPjMcgBaQdDmjolEeNqobcIHmp6uDo eZdQG42kLaeD4bDF2XtGggsXYRTC1eovH2pkG5B0HHttXkUtrYhj1TRsSRDTSea505bi e78p2tixtMClVYpwJIv8MFkOOhKysh5yRJtNK3wx9MpwyGAzQqz2CVFB0XX/h8hhwd6u 0uCZJhoVDP9Nwfy2Zq4a1uNEVJiJhBQcaVTAc2mhJ6Un3J3mjgL47Nm0aEaMVcYXK3HG wiGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WQlGQ9Jd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w20si12795913eji.110.2020.11.03.07.08.53; Tue, 03 Nov 2020 07:09:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WQlGQ9Jd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729640AbgKCOUs (ORCPT + 99 others); Tue, 3 Nov 2020 09:20:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40292 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729240AbgKCNpQ (ORCPT ); Tue, 3 Nov 2020 08:45:16 -0500 Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C86AC0613D1; Tue, 3 Nov 2020 05:45:16 -0800 (PST) Received: by mail-qk1-x741.google.com with SMTP id k9so14611729qki.6; Tue, 03 Nov 2020 05:45:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=WQlGQ9Jd6IJQey7nb9UMUDYsL+DEjmMTVkMHPOOrYSdV926tvA93ywvzKvPW9EdJzQ xWYruju83XXsh1i6XxcvxRg6hDqU6tq8BaNfGIDHsg2pgJYtsAkvynEeGwGPRGe+ZPsx biGcniO7POm0x08s1Iwq88HHNGiqadVQYcORh5b/WkN2ytRV8n2H7zXHbG9CyN36/TNs CvFVpr4PvgANBbzTT2RtpSiuCEWpI/CT6RmO+Fk+zaNRO64hUzWUoNMlpPKDi4ZwlNos 6rRlllg7BYoJdX53s9pkkLBvkmTEqozVXkK0+PARPMrbpsjLaiSLI/uef0UWqLlg9En5 LfmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=HaayDovTTYcLgBXGwRpwF834DWJCnWt26Nyrkv9jU0mFLzanG2jws27siHN0vFu1kL VF7IUlyXKExnFbU23Seq5Ym8g3b5R5a0cqH7hTVCOiYhK8IM7h0nH/r+h6U6fhtGCUYF TnhvbOEfI+CQR1R72okp0nMIiDiMOv0U1ljFYam0QfbnAEqWBX3Ib/Y2f7vmOFFejeCJ sAG/NsGhV5QLm8ASVCFb6Onx6pOkFUQY/5pwzl76uXfx4ztyGxY+c06YEim8zJbZ00xH B4aF6DWckYlYinuJK8g+pNVqTKusGApegVWZUgvMHgJaMFv4GG/V+sb0X679CPFof7Rp Jfbw== X-Gm-Message-State: AOAM532hEiDGtxucYTQXXbbmODfRf6sBpMLd462RD8tJ91Hnls+OYOFH 96ykj+alVkdTvHkz+tJyCmE= X-Received: by 2002:a37:6187:: with SMTP id v129mr8374191qkb.31.1604411115473; Tue, 03 Nov 2020 05:45:15 -0800 (PST) Received: from zhuyifei1999-ThinkPad-T480.gw.illinois.edu ([2620:0:e00:400f::31]) by smtp.gmail.com with ESMTPSA id a206sm7356568qkb.64.2020.11.03.05.45.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Nov 2020 05:45:14 -0800 (PST) From: YiFei Zhu To: containers@lists.linux-foundation.org Cc: YiFei Zhu , linux-csky@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, linux-xtensa@linux-xtensa.org, linux-kernel@vger.kernel.org, Aleksa Sarai , Andrea Arcangeli , Andy Lutomirski , David Laight , Dimitrios Skarlatos , Giuseppe Scrivano , Hubertus Franke , Jack Chen , Jann Horn , Josep Torrellas , Kees Cook , Tianyin Xu , Tobin Feldman-Fitzthum , Tycho Andersen , Valentin Rothberg , Will Drewry Subject: [PATCH seccomp 5/8] s390: Enable seccomp architecture tracking Date: Tue, 3 Nov 2020 07:43:01 -0600 Message-Id: <0fbe0c14d598e18effad3b648ab4808f9cd95eba.1604410035.git.yifeifz2@illinois.edu> X-Mailer: git-send-email 2.29.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: YiFei Zhu To enable seccomp constant action bitmaps, we need to have a static mapping to the audit architecture and system call table size. Add these for s390. Signed-off-by: YiFei Zhu --- arch/s390/include/asm/seccomp.h | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/s390/include/asm/seccomp.h b/arch/s390/include/asm/seccomp.h index 795bbe0d7ca6..71d46f0ba97b 100644 --- a/arch/s390/include/asm/seccomp.h +++ b/arch/s390/include/asm/seccomp.h @@ -16,4 +16,13 @@ #include +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_S390X +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "s390x" +#ifdef CONFIG_COMPAT +# define SECCOMP_ARCH_COMPAT AUDIT_ARCH_S390 +# define SECCOMP_ARCH_COMPAT_NR NR_syscalls +# define SECCOMP_ARCH_COMPAT_NAME "s390" +#endif + #endif /* _ASM_S390_SECCOMP_H */ -- 2.29.2