From 2fe6ea5740ef73210b16fe15f666cd2372db4290 Mon Sep 17 00:00:00 2001 From: Michal Simek Date: Fri, 6 Aug 2010 08:50:35 +0200 Subject: [PATCH] --- yaml --- r: 217124 b: refs/heads/master c: 68c6ac3366764730c6cc6bcc7003b233bd6b6571 h: refs/heads/master v: v3 --- [refs] | 2 +- trunk/arch/microblaze/Kconfig | 17 +++++++++++++++++ trunk/arch/microblaze/include/asm/seccomp.h | 16 ++++++++++++++++ 3 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 trunk/arch/microblaze/include/asm/seccomp.h diff --git a/[refs] b/[refs] index fd7f50e62673..3b9fd03dcd90 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 0425609680927f3368b0e0270452d41759d43b3f +refs/heads/master: 68c6ac3366764730c6cc6bcc7003b233bd6b6571 diff --git a/trunk/arch/microblaze/Kconfig b/trunk/arch/microblaze/Kconfig index 692fdfce2a23..dad40fc2bef8 100644 --- a/trunk/arch/microblaze/Kconfig +++ b/trunk/arch/microblaze/Kconfig @@ -121,6 +121,23 @@ config CMDLINE_FORCE Set this to have arguments from the default kernel command string override those passed by the boot loader. +config SECCOMP + bool "Enable seccomp to safely compute untrusted bytecode" + depends on PROC_FS + default y + help + This kernel feature is useful for number crunching applications + that may need to compute untrusted bytecode during their + execution. By using pipes or other transports made available to + the process as file descriptors supporting the read/write + syscalls, it's possible to isolate those applications in + their own address space using seccomp. Once seccomp is + enabled via /proc//seccomp, it cannot be disabled + and the task is only allowed to execute a few safe syscalls + defined by each seccomp mode. + + If unsure, say Y. Only embedded should say N here. + endmenu menu "Advanced setup" diff --git a/trunk/arch/microblaze/include/asm/seccomp.h b/trunk/arch/microblaze/include/asm/seccomp.h new file mode 100644 index 000000000000..0d912758a0d7 --- /dev/null +++ b/trunk/arch/microblaze/include/asm/seccomp.h @@ -0,0 +1,16 @@ +#ifndef _ASM_MICROBLAZE_SECCOMP_H +#define _ASM_MICROBLAZE_SECCOMP_H + +#include + +#define __NR_seccomp_read __NR_read +#define __NR_seccomp_write __NR_write +#define __NR_seccomp_exit __NR_exit +#define __NR_seccomp_sigreturn __NR_sigreturn + +#define __NR_seccomp_read_32 __NR_read +#define __NR_seccomp_write_32 __NR_write +#define __NR_seccomp_exit_32 __NR_exit +#define __NR_seccomp_sigreturn_32 __NR_sigreturn + +#endif /* _ASM_MICROBLAZE_SECCOMP_H */