x86: Enable seccomp architecture tracking
authorKees Cook <keescook@chromium.org>
Sun, 11 Oct 2020 15:47:44 +0000 (10:47 -0500)
committerKees Cook <keescook@chromium.org>
Fri, 20 Nov 2020 19:16:34 +0000 (11:16 -0800)
commit25db91209a910a0ccf8b093743088d0f4bf5659f
tree3933e4db559581a0eab9b204a5683e4c3a1e48d4
parent8e01b51a31a1e08e2c3e8fcc0ef6790441be2f61
x86: Enable seccomp architecture tracking

Provide seccomp internals with the details to calculate which syscall
table the running kernel is expecting to deal with. This allows for
efficient architecture pinning and paves the way for constant-action
bitmaps.

Co-developed-by: YiFei Zhu <yifeifz2@illinois.edu>
Signed-off-by: YiFei Zhu <yifeifz2@illinois.edu>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/da58c3733d95c4f2115dd94225dfbe2573ba4d87.1602431034.git.yifeifz2@illinois.edu
arch/x86/include/asm/seccomp.h