On Thu, 2012-02-16 at 14:02 -0600, Will Drewry wrote: > This change allows CONFIG_SECCOMP to make use of BPF programs for > user-controlled system call filtering (as shown in this patch series). [] > diff --git a/net/core/filter.c b/net/core/filter.c [] > @@ -542,9 +602,35 @@ int sk_chk_filter(struct sock_filter *filter, unsigned int flen) [] > case BPF_S_LD_W_ABS: > + MAYBE_USE_LOAD_FN(LD_W_ABS); > case BPF_S_LD_H_ABS: > + MAYBE_USE_LOAD_FN(LD_H_ABS); > case BPF_S_LD_B_ABS: > + MAYBE_USE_LOAD_FN(LD_B_ABS); Would be nice to note fallthrough or add break if necessary. -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html