diff options
author | Guo Ren <guoren@linux.alibaba.com> | 2020-05-26 10:11:52 +0200 |
---|---|---|
committer | Guo Ren <guoren@linux.alibaba.com> | 2020-07-31 03:51:05 +0200 |
commit | e95a4f8cb985e759648b32ed0b721a472deb86a5 (patch) | |
tree | 9768d128f9b8c74d12bd1b3a5ab64420de1ca72a /arch/csky/Kconfig | |
parent | csky: remove unusued thread_saved_pc and *_segments functions/macros (diff) | |
download | linux-e95a4f8cb985e759648b32ed0b721a472deb86a5.tar.xz linux-e95a4f8cb985e759648b32ed0b721a472deb86a5.zip |
csky: Add SECCOMP_FILTER supported
secure_computing() is called first in syscall_trace_enter() so that
a system call will be aborted quickly without doing succeeding syscall
tracing if seccomp rules want to deny that system call.
TODO:
- Update https://github.com/seccomp/libseccomp csky support
Signed-off-by: Guo Ren <guoren@linux.alibaba.com>
Cc: Arnd Bergmann <arnd@arndb.de>
Diffstat (limited to 'arch/csky/Kconfig')
-rw-r--r-- | arch/csky/Kconfig | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/arch/csky/Kconfig b/arch/csky/Kconfig index bd31ab12f77d..822362d0598e 100644 --- a/arch/csky/Kconfig +++ b/arch/csky/Kconfig @@ -38,6 +38,7 @@ config CSKY select GX6605S_TIMER if CPU_CK610 select HAVE_ARCH_TRACEHOOK select HAVE_ARCH_AUDITSYSCALL + select HAVE_ARCH_SECCOMP_FILTER select HAVE_COPY_THREAD_TLS select HAVE_DEBUG_BUGVERBOSE select HAVE_DYNAMIC_FTRACE @@ -296,3 +297,16 @@ endmenu source "arch/csky/Kconfig.platforms" source "kernel/Kconfig.hz" + +config SECCOMP + bool "Enable seccomp to safely compute untrusted bytecode" + help + This kernel feature is useful for number crunching applications + that may need to compute untrusted bytecode during their + execution. By using pipes or other transports made available to + the process as file descriptors supporting the read/write + syscalls, it's possible to isolate those applications in + their own address space using seccomp. Once seccomp is + enabled via prctl(PR_SET_SECCOMP), it cannot be disabled + and the task is only allowed to execute a few safe syscalls + defined by each seccomp mode. |