To enable seccomp constant action bitmaps, we need to have a static mapping to the audit architecture and system call table size.
Signed-off-by: Geert Uytterhoeven <ge...@linux-m68k.org> --- Needed for CONFIG_SECCOMP_CACHE_DEBUG. Note that upstream doesn't have m68k seccomp support yet. arch/m68k/include/asm/Kbuild | 1 - arch/m68k/include/asm/seccomp.h | 11 +++++++++++ 2 files changed, 11 insertions(+), 1 deletion(-) create mode 100644 arch/m68k/include/asm/seccomp.h diff --git a/arch/m68k/include/asm/Kbuild b/arch/m68k/include/asm/Kbuild index d9f0f283707ff352..1bff55aa2d54e2ce 100644 --- a/arch/m68k/include/asm/Kbuild +++ b/arch/m68k/include/asm/Kbuild @@ -4,5 +4,4 @@ generic-y += extable.h generic-y += kvm_para.h generic-y += local64.h generic-y += mcs_spinlock.h -generic-y += seccomp.h generic-y += spinlock.h diff --git a/arch/m68k/include/asm/seccomp.h b/arch/m68k/include/asm/seccomp.h new file mode 100644 index 0000000000000000..feefe511dd1f370d --- /dev/null +++ b/arch/m68k/include/asm/seccomp.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _ASM_M68K_SECCOMP_H +#define _ASM_M68K_SECCOMP_H + +#include <asm-generic/seccomp.h> + +#define SECCOMP_ARCH_NATIVE AUDIT_ARCH_M68K +#define SECCOMP_ARCH_NATIVE_NR NR_syscalls +#define SECCOMP_ARCH_NATIVE_NAME "m68k" + +#endif /* _ASM_M68K_SECCOMP_H */ -- 2.25.1