All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alejandro Colomar <alx.manpages@gmail.com>
To: mtk.manpages@gmail.com
Cc: Alejandro Colomar <alx.manpages@gmail.com>, linux-man@vger.kernel.org
Subject: [PATCH 04/10] seccomp.2: Use syscall(SYS_...); for system calls without a wrapper
Date: Sat, 22 May 2021 01:25:47 +0200	[thread overview]
Message-ID: <20210521232553.161080-4-alx.manpages@gmail.com> (raw)
In-Reply-To: <20210521232553.161080-1-alx.manpages@gmail.com>

Signed-off-by: Alejandro Colomar <alx.manpages@gmail.com>
---
 man2/seccomp.2 | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/man2/seccomp.2 b/man2/seccomp.2
index 1be7d6766..476e5c2f0 100644
--- a/man2/seccomp.2
+++ b/man2/seccomp.2
@@ -37,13 +37,18 @@ seccomp \- operate on Secure Computing state of the process
 .BR "#include <sys/ptrace.h>" "     /* Definition of " PTRACE_* " constants */"
 .\" Kees Cook noted: Anything that uses SECCOMP_RET_TRACE returns will
 .\"                  need <sys/ptrace.h>
+.BR "#include <sys/syscall.h>" "    /* Definition of " SYS_* " constants */"
+.B #include <unistd.h>
 .PP
-.BI "int seccomp(unsigned int " operation ", unsigned int " flags \
-", void *" args );
+.BI "int syscall(SYS_seccomp, unsigned int " operation ", unsigned int " flags ,
+.BI "            void *" args );
 .fi
 .PP
 .IR Note :
-There is no glibc wrapper for this system call; see NOTES.
+glibc provides no wrapper for
+.BR seccomp (2),
+necessitating the use of
+.BR syscall (2).
 .SH DESCRIPTION
 The
 .BR seccomp ()
@@ -858,9 +863,6 @@ Tile (since Linux 4.3)
 PA-RISC (since Linux 4.6)
 .\" User mode Linux since Linux 4.6
 .PD
-.PP
-Glibc does not provide a wrapper for this system call; call it using
-.BR syscall (2).
 .\"
 .SS Caveats
 There are various subtleties to consider when applying seccomp filters
-- 
2.31.1


  parent reply	other threads:[~2021-05-21 23:26 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-05-21 23:25 [PATCH 00/10] man2: SYNOPSIS: Use syscall, and fix includes Alejandro Colomar
2021-05-21 23:25 ` [PATCH 01/10] open.2: Remove unused <sys/stat.h> Alejandro Colomar
2021-05-21 23:25 ` [PATCH 02/10] rt_sigqueueinfo.2: Use syscall(SYS_...); for system calls without a wrapper Alejandro Colomar
2021-05-21 23:25 ` Alejandro Colomar [this message]
2021-05-21 23:25 ` [PATCH 05/10] set_thread_area.2: " Alejandro Colomar
2021-05-21 23:25 ` [PATCH 06/10] set_tid_address.2: " Alejandro Colomar
2021-05-21 23:25 ` [PATCH 07/10] sgetmask.2: " Alejandro Colomar
2021-05-21 23:25 ` [PATCH 08/10] shmop.2: Remove unused include Alejandro Colomar
2021-05-21 23:25 ` [PATCH 09/10] sigprocmask.2: Use syscall(SYS_...); for raw system calls Alejandro Colomar
2021-05-21 23:25 ` [PATCH 10/10] socketcall.2: Use syscall(SYS_...); for system calls without a wrapper Alejandro Colomar
2021-05-24 18:19   ` [PATCH v2 01/10] open.2: Remove unused <sys/stat.h> Alejandro Colomar
2021-06-09 22:23     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 02/10] rt_sigqueueinfo.2: Use syscall(SYS_...); for system calls without a wrapper Alejandro Colomar
2021-06-09 22:24     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 03/10] seccomp.2: Document why each header is needed Alejandro Colomar
2021-05-24 19:34     ` Alejandro Colomar (man-pages)
2021-06-09 22:30       ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 04/10] seccomp.2: Use syscall(SYS_...); for system calls without a wrapper Alejandro Colomar
2021-06-09 22:31     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 05/10] set_thread_area.2: " Alejandro Colomar
2021-06-09 22:24     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 06/10] set_tid_address.2: " Alejandro Colomar
2021-06-09 22:25     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 07/10] sgetmask.2: " Alejandro Colomar
2021-06-09 22:25     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 08/10] shmop.2: Remove unused include Alejandro Colomar
2021-06-09 22:25     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 09/10] sigprocmask.2: Use syscall(SYS_...); for raw system calls Alejandro Colomar
2021-06-09 22:26     ` Michael Kerrisk (man-pages)
2021-05-24 18:19   ` [PATCH v2 10/10] socketcall.2: Use syscall(SYS_...); for system calls without a wrapper Alejandro Colomar
2021-06-09 22:27     ` Michael Kerrisk (man-pages)
2021-05-24 19:09 ` [PATCH 00/10] man2: SYNOPSIS: Use syscall, and fix includes Alejandro Colomar (man-pages)
2021-06-09 22:28   ` Michael Kerrisk (man-pages)
2021-06-09 22:29   ` Michael Kerrisk (man-pages)

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210521232553.161080-4-alx.manpages@gmail.com \
    --to=alx.manpages@gmail.com \
    --cc=linux-man@vger.kernel.org \
    --cc=mtk.manpages@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.