Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3450236pxu; Sun, 20 Dec 2020 03:26:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJwc25G+/uElThTGAELA1GYHcWUe1dhzPDk7Jp37iUbL3nAn7+IpvOwv9rn3eyGeIorTcAZR X-Received: by 2002:aa7:cb10:: with SMTP id s16mr11925105edt.304.1608463578827; Sun, 20 Dec 2020 03:26:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608463578; cv=none; d=google.com; s=arc-20160816; b=dCM/P/DcIEjkGHuQBHtNsbejsa/rFUPIChIsloEnP3pvggfM3hW9l4Y3y7wVM2vQt8 HZHQaDC72sFMJNVihP2wT6mblWTndh/yzXBV2l2k87quAm/jLe5Uh1Q8Q2xEFIiy5jn5 +V0xlbI5EGZSUoeaKVy6raWV18lve5VegzvKzMqnCexDWYiWDDkC6H7rPr1nKpeN/fx2 7fOTv35xzTD2iLfC55ftjjqVcl4SJGKxrWMpdOu8bJlhSpbonGxm1vLUi0Dca24zPdbN K6nnD6Ce/wo1kzJYvF4osHFBE23gu/PTFo3KQp/kbbejFpqvb93SZGEFOiH8s6kGx7SY vYdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=4XSkcJQMcSnq5tl0VxECM1ml/LGS6dL3IMQSWlrswBI=; b=J6A7YKsMFMZiWjPYgvFVnVltHLW2NI9jB4cL1thKaVZCP07C0wKBcNnMJc/uoEawVE 0voM45Qtd8ywlMrjVixK1wM31g5i8UM5Rwzwp7/WoZ0w4HTeoyxpOlapOIlN6C3uYAKY hlP8MqU3ss9TGJinB+USia/xN2eh9UdfZGy0fKBRxW4vwUwF6s55XHrl++VwpXfNBegF xxXDUcDbTC3R5hMIFqI7XWYKaGIMVf3Tdvy0UccpbsvE6w5d6XeIsGXSae6YCYghgvIS LQYeH1HCb3yN98F0sZ45AcC1HKd+XnAvL6G2A2vURjrG3M1RBIIT97zJ7pM7IkkbHXwp kOhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o12si7229932ejg.407.2020.12.20.03.25.42; Sun, 20 Dec 2020 03:26:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727291AbgLTLYi (ORCPT + 99 others); Sun, 20 Dec 2020 06:24:38 -0500 Received: from outpost1.zedat.fu-berlin.de ([130.133.4.66]:34809 "EHLO outpost1.zedat.fu-berlin.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727222AbgLTLYi (ORCPT ); Sun, 20 Dec 2020 06:24:38 -0500 Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.94) with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (envelope-from ) id 1kqwoe-003U75-NG; Sun, 20 Dec 2020 12:23:56 +0100 Received: from dynamic-078-055-173-192.78.55.pool.telefonica.de ([78.55.173.192] helo=[192.168.1.10]) by inpost2.zedat.fu-berlin.de (Exim 4.94) with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (envelope-from ) id 1kqwoe-003wHr-Gd; Sun, 20 Dec 2020 12:23:56 +0100 Subject: Re: [PATCH] m68k: Enable seccomp architecture tracking To: Geert Uytterhoeven , linux-m68k@lists.linux-m68k.org Cc: YiFei Zhu , Kees Cook , linux-kernel@vger.kernel.org References: <20201220085141.1573113-1-geert@linux-m68k.org> From: John Paul Adrian Glaubitz Message-ID: <49a17a22-c657-8e26-6c84-36ef01264c5d@physik.fu-berlin.de> Date: Sun, 20 Dec 2020 12:23:55 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.1 MIME-Version: 1.0 In-Reply-To: <20201220085141.1573113-1-geert@linux-m68k.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Original-Sender: glaubitz@physik.fu-berlin.de X-Originating-IP: 78.55.173.192 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Geert! On 12/20/20 9:51 AM, Geert Uytterhoeven wrote: > To enable seccomp constant action bitmaps, we need to have a static > mapping to the audit architecture and system call table size. > > Signed-off-by: Geert Uytterhoeven > --- > Needed for CONFIG_SECCOMP_CACHE_DEBUG. > Note that upstream doesn't have m68k seccomp support yet. Have we added SECCOMP support for m68k to the kernel yet? It's actually something I was hoping to do over the holidays ;-). Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaubitz@debian.org `. `' Freie Universitaet Berlin - glaubitz@physik.fu-berlin.de `- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913