Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3385332pxu; Sun, 20 Dec 2020 00:54:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJyqiTdqE4nkTD6Mzey24bt1QMnyPL3PYYDx5Khw2zZXnPZvkEikqz9JgprrEjWLviweGS9U X-Received: by 2002:aa7:c813:: with SMTP id a19mr9237334edt.192.1608454467246; Sun, 20 Dec 2020 00:54:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608454467; cv=none; d=google.com; s=arc-20160816; b=QYCgY/Qj3qBPrqoVrZsEv/K93ALo26EEozbHtum1PlgDX5wDi1CHVIf7b0BwbtNc9+ /vw2ctUVOsYJ8+nLf8hE27A6td0o4yaYYyVJw8hDrPLA09qiKOQR9CsZOP1C0zVCrmuJ NNQmXNyCoMat5WscQr5C8hWSZLirwxQp435smrQKJarAYNMbg9PaP1/ROhSUo7W2AVtv KRr/+e36O8rsOkD/FDg1PdekHV0RkA1U0jz/48c/oMy9eVMC86RJvTLnZDB0kMpe7aw3 81oWvYv0wRFMdT0jeGMFqNOH3wCclCN3apNgkYVqsxTmIxem493IFQCvlhP1/BADH7Y3 o2tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Fqvl2Xmvx5f1kmo9Z2L4yecTbSWU9cZ3LYZnqP1NWeQ=; b=jX9DCZgtfxCIAJdRjK/4XzG+b58w6LciK1C2Z7vHBno8qfuA7ukJoKCYt0bvPovsp6 U7Of23tUpw448yUTYgbxEz4MPxq+pj4pBTTs1EYKtEEfj3OIudoiBk/wizalNOdaZPPE 3m72szC7czSOegh1pTvoAOkXGpl3/9jyqmS4tGPYRH5MN5GRAYbeGEFk6snJWWWUDlnb I1RSNg4yYeSQzY1lYGCQ//O05jbD5LGAqLDEfraLS9Zskj9OhJMPQGMHcCaRHukuCKDQ Ls5CfUGOgpOOSyx9aLjSGYKLMgANp8ngqd4bKesJb9amHI7N3amhStbFOW9ne/wxQ319 EHEw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i11si7172791ejb.22.2020.12.20.00.54.04; Sun, 20 Dec 2020 00:54:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727420AbgLTIw3 (ORCPT + 99 others); Sun, 20 Dec 2020 03:52:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52922 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727335AbgLTIw2 (ORCPT ); Sun, 20 Dec 2020 03:52:28 -0500 Received: from xavier.telenet-ops.be (xavier.telenet-ops.be [IPv6:2a02:1800:120:4::f00:14]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A61AFC0613CF for ; Sun, 20 Dec 2020 00:51:46 -0800 (PST) Received: from ramsan.of.borg ([84.195.186.194]) by xavier.telenet-ops.be with bizsmtp id 6Yrj2400C4C55Sk01YrjKP; Sun, 20 Dec 2020 09:51:43 +0100 Received: from rox.of.borg ([192.168.97.57]) by ramsan.of.borg with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1kquRL-00CPg7-1S; Sun, 20 Dec 2020 09:51:43 +0100 Received: from geert by rox.of.borg with local (Exim 4.93) (envelope-from ) id 1kquRK-006bNv-H9; Sun, 20 Dec 2020 09:51:42 +0100 From: Geert Uytterhoeven To: linux-m68k@lists.linux-m68k.org Cc: YiFei Zhu , Kees Cook , linux-kernel@vger.kernel.org, Geert Uytterhoeven Subject: [PATCH] m68k: Enable seccomp architecture tracking Date: Sun, 20 Dec 2020 09:51:41 +0100 Message-Id: <20201220085141.1573113-1-geert@linux-m68k.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org To enable seccomp constant action bitmaps, we need to have a static mapping to the audit architecture and system call table size. Signed-off-by: Geert Uytterhoeven --- Needed for CONFIG_SECCOMP_CACHE_DEBUG. Note that upstream doesn't have m68k seccomp support yet. arch/m68k/include/asm/Kbuild | 1 - arch/m68k/include/asm/seccomp.h | 11 +++++++++++ 2 files changed, 11 insertions(+), 1 deletion(-) create mode 100644 arch/m68k/include/asm/seccomp.h diff --git a/arch/m68k/include/asm/Kbuild b/arch/m68k/include/asm/Kbuild index d9f0f283707ff352..1bff55aa2d54e2ce 100644 --- a/arch/m68k/include/asm/Kbuild +++ b/arch/m68k/include/asm/Kbuild @@ -4,5 +4,4 @@ generic-y += extable.h generic-y += kvm_para.h generic-y += local64.h generic-y += mcs_spinlock.h -generic-y += seccomp.h generic-y += spinlock.h diff --git a/arch/m68k/include/asm/seccomp.h b/arch/m68k/include/asm/seccomp.h new file mode 100644 index 0000000000000000..feefe511dd1f370d --- /dev/null +++ b/arch/m68k/include/asm/seccomp.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _ASM_M68K_SECCOMP_H +#define _ASM_M68K_SECCOMP_H + +#include + +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_M68K +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "m68k" + +#endif /* _ASM_M68K_SECCOMP_H */ -- 2.25.1