summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2020-10-27 20:23:19 +0100
committerKees Cook <keescook@chromium.org>2020-11-20 20:16:34 +0100
commitffde703470b03b1000017ed35c4f90a90caa22cf (patch)
tree474d45a83a42b90af6a1cddcf71078927860c14e
parentselftests/seccomp: Compare bitmap vs filter overhead (diff)
downloadlinux-ffde703470b03b1000017ed35c4f90a90caa22cf.tar.xz
linux-ffde703470b03b1000017ed35c4f90a90caa22cf.zip
arm64: Enable seccomp architecture tracking
To enable seccomp constant action bitmaps, we need to have a static mapping to the audit architecture and system call table size. Add these for arm64. Signed-off-by: Kees Cook <keescook@chromium.org>
-rw-r--r--arch/arm64/include/asm/seccomp.h9
1 files changed, 9 insertions, 0 deletions
diff --git a/arch/arm64/include/asm/seccomp.h b/arch/arm64/include/asm/seccomp.h
index c36387170936..30256233788b 100644
--- a/arch/arm64/include/asm/seccomp.h
+++ b/arch/arm64/include/asm/seccomp.h
@@ -19,4 +19,13 @@
#include <asm-generic/seccomp.h>
+#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_AARCH64
+#define SECCOMP_ARCH_NATIVE_NR NR_syscalls
+#define SECCOMP_ARCH_NATIVE_NAME "aarch64"
+#ifdef CONFIG_COMPAT
+# define SECCOMP_ARCH_COMPAT AUDIT_ARCH_ARM
+# define SECCOMP_ARCH_COMPAT_NR __NR_compat_syscalls
+# define SECCOMP_ARCH_COMPAT_NAME "arm"
+#endif
+
#endif /* _ASM_SECCOMP_H */