Name
SECCOMP — Enable seccomp to safely compute untrusted bytecode
Description
This kernel feature is useful for number-crunching applications
that may need to compute untrusted bytecode during their
execution. By using pipes or other transports made available to
the process as file descriptors supporting the read/write
syscalls, it's possible to isolate those applications in
their own address space using seccomp. Once seccomp is
enabled via /proc/pid/seccomp, it cannot be disabled
and the task is allowed to execute only a few safe syscalls
defined by each seccomp mode.
If you are unsure, say yes. Only embedded systems should be
built by answering no.