Quote from https://capsule8.com/blog/kernel-configuration-glossary/: > Significance: Critical > > This kernel feature is useful for number crunching applications that may need > to compute untrusted bytecode during their execution. By using pipes or other > transports made available to the process as file descriptors supporting the > read/write syscalls it's possible to isolate those applications in their own > address space using seccomp. Once seccomp is enabled via prctl(PR_SET_SECCOMP) > it cannot be disabled and the task is only allowed to execute a few safe > syscalls defined by each seccomp mode.
https://patchwork.ipfire.org/patch/3163/
https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=7617da3bba48d40284c2fd93d0265a0bce64aed0
This was reverted meanwhile.
https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=16eb2d5379757076c23b4cdd14a8af595fd9d1bc
https://blog.ipfire.org/post/ipfire-2-27-core-update-171-is-available-for-testing
https://blog.ipfire.org/post/ipfire-2-27-core-update-171-released-security-advisory