[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202012151225.4881A90257@keescook>
Date: Tue, 15 Dec 2020 12:30:17 -0800
From: Kees Cook <keescook@...omium.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org,
Dimitrios Skarlatos <dskarlat@...cmu.edu>,
Heiko Carstens <hca@...ux.ibm.com>,
Helge Deller <deller@....de>, Jann Horn <jannh@...gle.com>,
Kees Cook <keescook@...omium.org>,
Mickaël Salaün <mic@...ux.microsoft.com>,
Shuah Khan <shuah@...nel.org>,
Tycho Andersen <tycho@...ho.pizza>,
Tyler Hicks <code@...icks.com>,
YiFei Zhu <yifeifz2@...inois.edu>
Subject: [GIT PULL] seccomp updates for v5.11-rc1
Hi Linus,
Please pull these seccomp updates for v5.11-rc1. The major change here
is finally gaining seccomp constant-action bitmaps, which internally
reduces the seccomp overhead for many real-world syscall filters to O(1),
as discussed at Plumbers this year.
Thanks!
-Kees
The following changes since commit 4c222f31fb1db4d590503a181a6268ced9252379:
selftests/seccomp: sh: Fix register names (2020-11-20 11:03:08 -0800)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/seccomp-v5.11-rc1
for you to fetch changes up to 2c07343abd8932200a45ff7b10950e71081e9e77:
selftests/seccomp: Update kernel config (2020-12-02 11:20:54 -0800)
----------------------------------------------------------------
seccomp updates for v5.11-rc1
- Improve seccomp performance via constant-action bitmaps (YiFei Zhu & Kees Cook)
- Fix bogus __user annotations (Jann Horn)
- Add missed CONFIG for improved selftest coverage (Mickaël Salaün)
----------------------------------------------------------------
Jann Horn (1):
seccomp: Remove bogus __user annotations
Kees Cook (5):
x86: Enable seccomp architecture tracking
selftests/seccomp: Compare bitmap vs filter overhead
arm64: Enable seccomp architecture tracking
arm: Enable seccomp architecture tracking
Merge branch 'for-linus/seccomp' into for-next/seccomp
Mickaël Salaün (1):
selftests/seccomp: Update kernel config
YiFei Zhu (10):
seccomp/cache: Lookup syscall allowlist bitmap for fast path
seccomp/cache: Add "emulator" to check if filter is constant allow
csky: Enable seccomp architecture tracking
parisc: Enable seccomp architecture tracking
powerpc: Enable seccomp architecture tracking
riscv: Enable seccomp architecture tracking
s390: Enable seccomp architecture tracking
sh: Enable seccomp architecture tracking
xtensa: Enable seccomp architecture tracking
seccomp/cache: Report cache data through /proc/pid/seccomp_cache
arch/Kconfig | 17 ++
arch/arm/include/asm/Kbuild | 1 -
arch/arm/include/asm/seccomp.h | 11 +
arch/arm64/include/asm/seccomp.h | 9 +
arch/csky/include/asm/Kbuild | 1 -
arch/csky/include/asm/seccomp.h | 11 +
arch/parisc/include/asm/Kbuild | 1 -
arch/parisc/include/asm/seccomp.h | 22 ++
arch/powerpc/include/asm/seccomp.h | 23 ++
arch/riscv/include/asm/seccomp.h | 10 +
arch/s390/include/asm/seccomp.h | 9 +
arch/sh/include/asm/seccomp.h | 10 +
arch/x86/include/asm/seccomp.h | 20 ++
arch/xtensa/include/asm/Kbuild | 1 -
arch/xtensa/include/asm/seccomp.h | 11 +
fs/proc/base.c | 6 +
include/linux/seccomp.h | 7 +
kernel/seccomp.c | 296 ++++++++++++++++++++-
tools/testing/selftests/seccomp/config | 1 +
.../testing/selftests/seccomp/seccomp_benchmark.c | 151 +++++++++--
tools/testing/selftests/seccomp/settings | 2 +-
21 files changed, 590 insertions(+), 30 deletions(-)
create mode 100644 arch/arm/include/asm/seccomp.h
create mode 100644 arch/csky/include/asm/seccomp.h
create mode 100644 arch/parisc/include/asm/seccomp.h
create mode 100644 arch/xtensa/include/asm/seccomp.h
--
Kees Cook
Powered by blists - more mailing lists