Signed-off-by: Alejandro Colomar <alx.manpages@xxxxxxxxx> --- man2/seccomp.2 | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/man2/seccomp.2 b/man2/seccomp.2 index 1be7d6766..476e5c2f0 100644 --- a/man2/seccomp.2 +++ b/man2/seccomp.2 @@ -37,13 +37,18 @@ seccomp \- operate on Secure Computing state of the process .BR "#include <sys/ptrace.h>" " /* Definition of " PTRACE_* " constants */" .\" Kees Cook noted: Anything that uses SECCOMP_RET_TRACE returns will .\" need <sys/ptrace.h> +.BR "#include <sys/syscall.h>" " /* Definition of " SYS_* " constants */" +.B #include <unistd.h> .PP -.BI "int seccomp(unsigned int " operation ", unsigned int " flags \ -", void *" args ); +.BI "int syscall(SYS_seccomp, unsigned int " operation ", unsigned int " flags , +.BI " void *" args ); .fi .PP .IR Note : -There is no glibc wrapper for this system call; see NOTES. +glibc provides no wrapper for +.BR seccomp (2), +necessitating the use of +.BR syscall (2). .SH DESCRIPTION The .BR seccomp () @@ -858,9 +863,6 @@ Tile (since Linux 4.3) PA-RISC (since Linux 4.6) .\" User mode Linux since Linux 4.6 .PD -.PP -Glibc does not provide a wrapper for this system call; call it using -.BR syscall (2). .\" .SS Caveats There are various subtleties to consider when applying seccomp filters -- 2.31.1