On Thu, Jan 12, 2012 at 12:16 PM, Randy Dunlap <rdunlap@xxxxxxxxxxxx> wrote: > On 01/11/2012 03:19 PM, Will Drewry wrote: >> Document how system call filtering with BPF works and >> may be used. Includes an example for x86 (32-bit). > > Please tell some of us what "BPF" means. wikipedia lists 15 possible > choices, but I don't know which one to choose. I'll make it clearer in the documentation file and update the patch description. BPF == Berkeley Packet Filters which are implemented in Linux Socket Filters (LSF)> thanks! >> Signed-off-by: Will Drewry <wad@xxxxxxxxxxxx> >> --- >> Documentation/prctl/seccomp_filter.txt | 99 ++++++++++++++++++++++++++++++++ >> samples/Makefile | 2 +- >> samples/seccomp/Makefile | 12 ++++ >> samples/seccomp/bpf-example.c | 74 ++++++++++++++++++++++++ >> 4 files changed, 186 insertions(+), 1 deletions(-) >> create mode 100644 Documentation/prctl/seccomp_filter.txt >> create mode 100644 samples/seccomp/Makefile >> create mode 100644 samples/seccomp/bpf-example.c > > > -- > ~Randy > *** Remember to use Documentation/SubmitChecklist when testing your code *** -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html