csky: Enable seccomp architecture tracking
authorYiFei Zhu <yifeifz2@illinois.edu>
Wed, 11 Nov 2020 13:33:47 +0000 (07:33 -0600)
committerKees Cook <keescook@chromium.org>
Fri, 20 Nov 2020 19:16:34 +0000 (11:16 -0800)
To enable seccomp constant action bitmaps, we need to have a static
mapping to the audit architecture and system call table size. Add these
for csky.

Signed-off-by: YiFei Zhu <yifeifz2@illinois.edu>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/f9219026d4803b22f3e57e3768b4e42e004ef236.1605101222.git.yifeifz2@illinois.edu
arch/csky/include/asm/Kbuild
arch/csky/include/asm/seccomp.h [new file with mode: 0644]

index 64876e5..9337225 100644 (file)
@@ -4,6 +4,5 @@ generic-y += gpio.h
 generic-y += kvm_para.h
 generic-y += local64.h
 generic-y += qrwlock.h
-generic-y += seccomp.h
 generic-y += user.h
 generic-y += vmlinux.lds.h
diff --git a/arch/csky/include/asm/seccomp.h b/arch/csky/include/asm/seccomp.h
new file mode 100644 (file)
index 0000000..d33e758
--- /dev/null
@@ -0,0 +1,11 @@
+/* SPDX-License-Identifier: GPL-2.0-only */
+#ifndef _ASM_SECCOMP_H
+#define _ASM_SECCOMP_H
+
+#include <asm-generic/seccomp.h>
+
+#define SECCOMP_ARCH_NATIVE            AUDIT_ARCH_CSKY
+#define SECCOMP_ARCH_NATIVE_NR         NR_syscalls
+#define SECCOMP_ARCH_NATIVE_NAME       "csky"
+
+#endif /* _ASM_SECCOMP_H */