diff options
author | Kees Cook <keescook@chromium.org> | 2020-10-27 12:26:58 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2020-11-20 11:16:34 -0800 |
commit | 424c9102fa7b2a5c15afe47fd14278c849f4eefb (patch) | |
tree | f69deecf91275e42eda6b7b57a16a59006de274e /arch/arm/include/asm/seccomp.h | |
parent | ffde703470b03b1000017ed35c4f90a90caa22cf (diff) | |
download | linux-424c9102fa7b2a5c15afe47fd14278c849f4eefb.tar.gz linux-424c9102fa7b2a5c15afe47fd14278c849f4eefb.tar.bz2 linux-424c9102fa7b2a5c15afe47fd14278c849f4eefb.zip |
arm: Enable seccomp architecture tracking
To enable seccomp constant action bitmaps, we need to have a static
mapping to the audit architecture and system call table size. Add these
for arm.
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'arch/arm/include/asm/seccomp.h')
-rw-r--r-- | arch/arm/include/asm/seccomp.h | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/arch/arm/include/asm/seccomp.h b/arch/arm/include/asm/seccomp.h new file mode 100644 index 000000000000..e9ad0f37d2ba --- /dev/null +++ b/arch/arm/include/asm/seccomp.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _ASM_SECCOMP_H +#define _ASM_SECCOMP_H + +#include <asm-generic/seccomp.h> + +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_ARM +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "arm" + +#endif /* _ASM_SECCOMP_H */ |