.BR SCM_RIGHTS
ancillary message type described in
.BR unix (7)).
-Another possibility is that the supervisor might inherit
-the file descriptor via
-.BR fork (2).
.\"-------------------------------------
.IP 3.
The supervisor process will receive notification events
values of pointer arguments for the target process's system call.
(This is something that can't be done from within a seccomp filter.)
To do this (and assuming it has suitable permissions),
-the supervisor opens the corresponding
+One way in which the supervisor can do this is to open the corresponding
.I /proc/[pid]/mem
-file, seeks to the memory location that corresponds
-to one of the pointer arguments whose value is supplied
-in the notification event,
-and reads bytes from that location.
+file and read bytes from the location that corresponds to one of
+the pointer arguments whose value is supplied in the notification event.
.\" Tycho Andersen mentioned that there are alternatives to /proc/PID/mem,
.\" such as ptrace() and /proc/PID/map_files
(The supervisor must be careful to avoid
.SH SEE ALSO
.BR ioctl (2),
.BR seccomp (2)
+.PP
+A further example program can be found in the kernel source file
+.IR samples/seccomp/user-trap.c .