From: Vitaly _Vi Shukela <[email protected]>

---
 doc/man/man3/seccomp_rule_add.3              | 28 ++++++++++++++++++++++++++--
 doc/man/man3/seccomp_rule_add_array.3        |  1 +
 doc/man/man3/seccomp_rule_add_array_exact.3  |  1 +
 doc/man/man3/seccomp_rule_add_valist.3       |  1 +
 doc/man/man3/seccomp_rule_add_valist_exact.3 |  1 +
 5 files changed, 30 insertions(+), 2 deletions(-)
 create mode 100644 doc/man/man3/seccomp_rule_add_array.3
 create mode 100644 doc/man/man3/seccomp_rule_add_array_exact.3
 create mode 100644 doc/man/man3/seccomp_rule_add_valist.3
 create mode 100644 doc/man/man3/seccomp_rule_add_valist_exact.3

diff --git a/doc/man/man3/seccomp_rule_add.3 b/doc/man/man3/seccomp_rule_add.3
index eeb61dc..17408b8 100644
--- a/doc/man/man3/seccomp_rule_add.3
+++ b/doc/man/man3/seccomp_rule_add.3
@@ -27,6 +27,19 @@ seccomp_rule_add, seccomp_rule_add_exact \- Add a seccomp 
filter rule
 .BI "int seccomp_rule_add_exact(scmp_filter_ctx " ctx ", uint32_t " action ","
 .BI "                           int " syscall ", unsigned int " arg_cnt ", " 
... ");"
 .sp
+.BI "int seccomp_rule_add_valist(scmp_filter_ctx " ctx ", "
+.BI "            uint32_t " action ", int " syscall ", unsigned int " arg_cnt 
", "
+.BI "            va_list " arg_list ");"
+.BI "int seccomp_rule_add_valist_exact(scmp_filter_ctx " ctx ", uint32_t " 
action ","
+.BI "            int " syscall ", unsigned int " arg_cnt ","
+.BI "            va_list " arg_list ");"
+.BI "int seccomp_rule_add_array(scmp_filter_ctx " ctx ","
+.BI "            uint32_t " action ", int " syscall ", unsigned int " arg_cnt 
", "
+.BI "            const struct scmp_arg_cmp *" arg_array ");"
+.BI "int seccomp_rule_add_array_exact(scmp_filter_ctx " ctx ","
+.BI "            uint32_t " action ", int " syscall ", unsigned int " arg_cnt 
","
+.BI "            const struct scmp_arg_cmp *" arg_array ");"
+.sp
 Link with \fI\-lseccomp\fP.
 .fi
 .\" //////////////////////////////////////////////////////////////////////////
@@ -49,6 +62,16 @@ filter ruleset,
 .BR seccomp_rule_add ()
 does guarantee the same behavior regardless of the architecture.
 .P
+There are also variants of adding functions that take va_list 
+or array of structs:
+.BR seccomp_rule_add_valist ()
+,
+.BR seccomp_rule_add_valist_exact ()
+,
+.BR seccomp_rule_add_array ()
+and
+.BR seccomp_rule_add_array_exact ()
+.P
 The newly added filter rule does not take effect until the entire filter is
 loaded into the kernel using
 .BR seccomp_load (3).
@@ -235,8 +258,9 @@ int main(int argc, char *argv[])
        if (rc < 0)
                goto out;
 
-       rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 1,
-                             SCMP_CMP(0, SCMP_CMP_EQ, fd));
+       struct scmp_arg_cmp comparations[1] = { SCMP_CMP(0, SCMP_CMP_EQ, fd) };
+       rc = seccomp_rule_add_array(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 1,
+                             comparations);
        if (rc < 0)
                goto out;
 
diff --git a/doc/man/man3/seccomp_rule_add_array.3 
b/doc/man/man3/seccomp_rule_add_array.3
new file mode 100644
index 0000000..53714e7
--- /dev/null
+++ b/doc/man/man3/seccomp_rule_add_array.3
@@ -0,0 +1 @@
+.so man3/seccomp_rule_add.3
diff --git a/doc/man/man3/seccomp_rule_add_array_exact.3 
b/doc/man/man3/seccomp_rule_add_array_exact.3
new file mode 100644
index 0000000..53714e7
--- /dev/null
+++ b/doc/man/man3/seccomp_rule_add_array_exact.3
@@ -0,0 +1 @@
+.so man3/seccomp_rule_add.3
diff --git a/doc/man/man3/seccomp_rule_add_valist.3 
b/doc/man/man3/seccomp_rule_add_valist.3
new file mode 100644
index 0000000..53714e7
--- /dev/null
+++ b/doc/man/man3/seccomp_rule_add_valist.3
@@ -0,0 +1 @@
+.so man3/seccomp_rule_add.3
diff --git a/doc/man/man3/seccomp_rule_add_valist_exact.3 
b/doc/man/man3/seccomp_rule_add_valist_exact.3
new file mode 100644
index 0000000..53714e7
--- /dev/null
+++ b/doc/man/man3/seccomp_rule_add_valist_exact.3
@@ -0,0 +1 @@
+.so man3/seccomp_rule_add.3
-- 
1.7.11.6.1.gada05e2


------------------------------------------------------------------------------
Free Next-Gen Firewall Hardware Offer
Buy your Sophos next-gen firewall before the end March 2013 
and get the hardware for free! Learn more.
http://p.sf.net/sfu/sophos-d2d-feb
_______________________________________________
libseccomp-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/libseccomp-discuss

Reply via email to