On Sun, 11 Oct 2020 10:47:41 -0500, YiFei Zhu wrote: > Alternative: https://lore.kernel.org/lkml/20200923232923.3142503-1-keescook@xxxxxxxxxxxx/T/ > > Major differences from the linked alternative by Kees: > * No x32 special-case handling -- not worth the complexity > * No caching of denylist -- not worth the complexity > * No seccomp arch pinning -- I think this is an independent feature > * The bitmaps are part of the filters rather than the task. > > [...] Applied to for-next/seccomp, thanks! I left off patch 5 for now until we sort out the rest of the SECCOMP_FILTER architectures, and tweaked patch 3 to include the architecture names. [1/4] seccomp/cache: Lookup syscall allowlist bitmap for fast path https://git.kernel.org/kees/c/f94defb8bf46 [2/4] seccomp/cache: Add "emulator" to check if filter is constant allow https://git.kernel.org/kees/c/e7dc9f1e5f6b [3/4] x86: Enable seccomp architecture tracking https://git.kernel.org/kees/c/1f68a4d393fe [4/4] selftests/seccomp: Compare bitmap vs filter overhead https://git.kernel.org/kees/c/57a339117e52 -- Kees Cook