Kconfig (2871f352c600d36b1b8ba57c79029cf8aa512948) | Kconfig (c90f06943e05519a87140dc407cf589c220aeedf) |
---|---|
1config PARISC 2 def_bool y 3 select ARCH_HAS_DEBUG_STRICT_USER_COPY_CHECKS 4 select ARCH_MIGHT_HAVE_PC_PARPORT 5 select HAVE_IDE 6 select HAVE_OPROFILE 7 select HAVE_FUNCTION_TRACER if 64BIT 8 select HAVE_FUNCTION_GRAPH_TRACER if 64BIT --- 307 unchanged lines hidden (view full) --- 316source "net/Kconfig" 317 318source "drivers/Kconfig" 319 320source "fs/Kconfig" 321 322source "arch/parisc/Kconfig.debug" 323 | 1config PARISC 2 def_bool y 3 select ARCH_HAS_DEBUG_STRICT_USER_COPY_CHECKS 4 select ARCH_MIGHT_HAVE_PC_PARPORT 5 select HAVE_IDE 6 select HAVE_OPROFILE 7 select HAVE_FUNCTION_TRACER if 64BIT 8 select HAVE_FUNCTION_GRAPH_TRACER if 64BIT --- 307 unchanged lines hidden (view full) --- 316source "net/Kconfig" 317 318source "drivers/Kconfig" 319 320source "fs/Kconfig" 321 322source "arch/parisc/Kconfig.debug" 323 |
324config SECCOMP 325 def_bool y 326 prompt "Enable seccomp to safely compute untrusted bytecode" 327 ---help--- 328 This kernel feature is useful for number crunching applications 329 that may need to compute untrusted bytecode during their 330 execution. By using pipes or other transports made available to 331 the process as file descriptors supporting the read/write 332 syscalls, it's possible to isolate those applications in 333 their own address space using seccomp. Once seccomp is 334 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled 335 and the task is only allowed to execute a few safe syscalls 336 defined by each seccomp mode. 337 338 If unsure, say Y. Only embedded should say N here. 339 |
|
324source "security/Kconfig" 325 326source "crypto/Kconfig" 327 328source "lib/Kconfig" | 340source "security/Kconfig" 341 342source "crypto/Kconfig" 343 344source "lib/Kconfig" |