Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp367835pxb; Wed, 11 Nov 2020 05:53:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJy/EiVR/RXEFJO0WcPYYl9jpnzylPUQLFICcUC22uA0fKC2X/APKbF/riILU8gXCeCRkodS X-Received: by 2002:a05:6402:b8e:: with SMTP id cf14mr25765509edb.86.1605102793473; Wed, 11 Nov 2020 05:53:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605102793; cv=none; d=google.com; s=arc-20160816; b=mYO5HNpnKq/DazVU/tRxgvWR3pyJR+8jenHzIxGRAOMTG4ddxT9SOXIx54ufheVJld Y8OTWTc5mNhwhIQK+qLaLIqEVAIIN+hCgoASKsh2sZ9BJI+JHLhKtW/BGBKMmcqKIEzg mZrr7xctHq09hdevmhbMP0qJxk7gDiESH/iRfUQ1Jb74rI6wAzsOMiqqM6bbOteZgxRW YVqF4nRXg75JLlhA8YZk1jLUUVGEnQqVTVFJb3CRi04eqSqjxKL+6HRczERYyWdQryzC cyeCGiS1CsXqrwJKapRWAi7Ahdj2nGMUqg2zvB7TF4I3jLq+0wJWxKlQvaLAjlxz5tOM Lp/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=nGsn9Sk/fZq/URdMu6f8dR4YAiZZzRNwbDNHbF71ziO9TCp5zmOHYJobad2ZIONubk D61AyE0l/2weFBX1Pd7vlXBckO5QfVXX0zWXPgdRmbrPuH2waIyMKBdnJFMjt8utzqwD LtAH9nALxywtysbz0aZZISP3zLPgRf9114fn7O3VGfN9ZTPDQiFoyG8UKv+hE5oGt2Mv /b72uY0wsfrxer4l4J4edRQiXv8MVCLUL+ECADscKuVKgqcoFb66UfYpz6aMy3yMi+x2 dqnGKuGyFJg3Zce5y5Ay5/Ym6hwoH6EFfZdPXiWMFgj0HHixwQXyr2KZzJuw1E5M8GJ7 7zPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=CtuNdkss; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp1si1567443ejc.167.2020.11.11.05.52.48; Wed, 11 Nov 2020 05:53:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=CtuNdkss; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726949AbgKKNfS (ORCPT + 99 others); Wed, 11 Nov 2020 08:35:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54098 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726514AbgKKNel (ORCPT ); Wed, 11 Nov 2020 08:34:41 -0500 Received: from mail-qk1-x742.google.com (mail-qk1-x742.google.com [IPv6:2607:f8b0:4864:20::742]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB26BC0613D1; Wed, 11 Nov 2020 05:34:40 -0800 (PST) Received: by mail-qk1-x742.google.com with SMTP id q5so1560704qkc.12; Wed, 11 Nov 2020 05:34:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=CtuNdkss3y7rgKc1l9KsIQZTv0LgZAhMRYi/6z6qZmeZkTtZ4x7E48r/LeELYZ06IN 8cgqYZ8dHlw0uxtVdsPuGe5k/uNahk9dBk2utYsfhVEV4Ba/sogSqNiIxMOka14XZD8a eupUAgtHJBLzSWs9IfisbVC1mdakqgfudFjJHeYdfmpXX0W03tbjgHa1X2SdS54+cwbz 4hcZkRNxXc8xWoaxyCLZaNV6QnzDrrzHDB6WZ3omhkvvhakq0V/TBs/W/M2pg4I58bEk U0Idcw73pn5TTYmrEG4CqfKVjhniq9pyecl8f2TP5P/XCIVnlIMOYfN29gQ3XF6HZQop jcCA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=+eMXBOnvKPM7N/Eu0cs4UA1I6FeurfdgB6uFLVTMPX8=; b=o+PNKlr606hn2RK4tip9lJKu/b2ENbQAy0NCBgdCsz5sjxUITQFpoK1Jbe9vUmo4mK DdPnaPjZ0LfHr+Kckm7oaIsJX9rk9XbcpQleOStc4gphOejzdK6bLYmVzRsr4Q2WV913 vJ7RXnI/2/b7YUJRVoA5/yZGFC/YDjdw2MaqBmLjjlmfOJHGENf/Iu781jQ7FcVH+U3g X+wo1vFr5UztC5pp8iwQLzR6aPyRQ1289D/NRswV6u1Q11xrYuCR6YWnNhW01aevePIr hxSYg4OmAqBJQQJ0Q5A1k8M6/R7F6qHcT0D23gAk+EncLeJnvJ1OTi97LcYAM3YeSCF1 6+lw== X-Gm-Message-State: AOAM531D3NxYv5mPN66jCwv/w9pyxbijyKNHsDnNHyXQMF6fLBwcIyYG LqluE9+OM8SmWTMYjLfy3so= X-Received: by 2002:a37:7fc7:: with SMTP id a190mr24750394qkd.337.1605101680151; Wed, 11 Nov 2020 05:34:40 -0800 (PST) Received: from localhost.localdomain (host-173-230-99-154.tnkngak.clients.pavlovmedia.com. [173.230.99.154]) by smtp.gmail.com with ESMTPSA id r190sm1997814qkf.101.2020.11.11.05.34.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 05:34:39 -0800 (PST) From: YiFei Zhu To: containers@lists.linux-foundation.org Cc: YiFei Zhu , linux-csky@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, linux-xtensa@linux-xtensa.org, linux-kernel@vger.kernel.org, Aleksa Sarai , Andrea Arcangeli , Andy Lutomirski , David Laight , Dimitrios Skarlatos , Giuseppe Scrivano , Hubertus Franke , Jack Chen , Jann Horn , Josep Torrellas , Kees Cook , Tianyin Xu , Tobin Feldman-Fitzthum , Tycho Andersen , Valentin Rothberg , Will Drewry Subject: [PATCH seccomp v2 5/8] s390: Enable seccomp architecture tracking Date: Wed, 11 Nov 2020 07:33:51 -0600 Message-Id: X-Mailer: git-send-email 2.29.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: YiFei Zhu To enable seccomp constant action bitmaps, we need to have a static mapping to the audit architecture and system call table size. Add these for s390. Signed-off-by: YiFei Zhu --- arch/s390/include/asm/seccomp.h | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/s390/include/asm/seccomp.h b/arch/s390/include/asm/seccomp.h index 795bbe0d7ca6..71d46f0ba97b 100644 --- a/arch/s390/include/asm/seccomp.h +++ b/arch/s390/include/asm/seccomp.h @@ -16,4 +16,13 @@ #include +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_S390X +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "s390x" +#ifdef CONFIG_COMPAT +# define SECCOMP_ARCH_COMPAT AUDIT_ARCH_S390 +# define SECCOMP_ARCH_COMPAT_NR NR_syscalls +# define SECCOMP_ARCH_COMPAT_NAME "s390" +#endif + #endif /* _ASM_S390_SECCOMP_H */ -- 2.29.2