diff options
author | Kees Cook <keescook@chromium.org> | 2020-10-27 20:23:19 +0100 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2020-11-20 20:16:34 +0100 |
commit | ffde703470b03b1000017ed35c4f90a90caa22cf (patch) | |
tree | 474d45a83a42b90af6a1cddcf71078927860c14e | |
parent | selftests/seccomp: Compare bitmap vs filter overhead (diff) | |
download | linux-ffde703470b03b1000017ed35c4f90a90caa22cf.tar.xz linux-ffde703470b03b1000017ed35c4f90a90caa22cf.zip |
arm64: Enable seccomp architecture tracking
To enable seccomp constant action bitmaps, we need to have a static
mapping to the audit architecture and system call table size. Add these
for arm64.
Signed-off-by: Kees Cook <keescook@chromium.org>
-rw-r--r-- | arch/arm64/include/asm/seccomp.h | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/arch/arm64/include/asm/seccomp.h b/arch/arm64/include/asm/seccomp.h index c36387170936..30256233788b 100644 --- a/arch/arm64/include/asm/seccomp.h +++ b/arch/arm64/include/asm/seccomp.h @@ -19,4 +19,13 @@ #include <asm-generic/seccomp.h> +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_AARCH64 +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "aarch64" +#ifdef CONFIG_COMPAT +# define SECCOMP_ARCH_COMPAT AUDIT_ARCH_ARM +# define SECCOMP_ARCH_COMPAT_NR __NR_compat_syscalls +# define SECCOMP_ARCH_COMPAT_NAME "arm" +#endif + #endif /* _ASM_SECCOMP_H */ |