On 5/25/21 6:19 AM, Alejandro Colomar wrote: > Signed-off-by: Alejandro Colomar <alx.manpages@xxxxxxxxx> This patch doesn't apply. Probably because I dropped 3/10? Thanks, Michael > --- > man2/seccomp.2 | 14 ++++++++------ > 1 file changed, 8 insertions(+), 6 deletions(-) > > diff --git a/man2/seccomp.2 b/man2/seccomp.2 > index 1be7d6766..0f3f30767 100644 > --- a/man2/seccomp.2 > +++ b/man2/seccomp.2 > @@ -37,13 +37,18 @@ seccomp \- operate on Secure Computing state of the process > .BR "#include <sys/ptrace.h>" " /* Definition of " PTRACE_* " constants */" > .\" Kees Cook noted: Anything that uses SECCOMP_RET_TRACE returns will > .\" need <sys/ptrace.h> > +.BR "#include <sys/syscall.h>" " /* Definition of " SYS_* " constants */" > +.B #include <unistd.h> > .PP > -.BI "int seccomp(unsigned int " operation ", unsigned int " flags \ > -", void *" args ); > +.BI "int syscall(SYS_seccomp, unsigned int " operation ", unsigned int " flags , > +.BI " void *" args ); > .fi > .PP > .IR Note : > -There is no glibc wrapper for this system call; see NOTES. > +glibc provides no wrapper for > +.BR seccomp (), > +necessitating the use of > +.BR syscall (2). > .SH DESCRIPTION > The > .BR seccomp () > @@ -858,9 +863,6 @@ Tile (since Linux 4.3) > PA-RISC (since Linux 4.6) > .\" User mode Linux since Linux 4.6 > .PD > -.PP > -Glibc does not provide a wrapper for this system call; call it using > -.BR syscall (2). > .\" > .SS Caveats > There are various subtleties to consider when applying seccomp filters > -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/