seccomp is Linux's syscall filtering facility; applications define a restricted set of syscalls they are allowed to make once they have setup their core functionality. This is a tracker bug for packages which don't currently have seccomp exposed as a USE flag / force it off, or where it is compiled in, but for some reason not enabled (e.g. config, see bug 711058). If there are bugs in that package's seccomp implementation, we should try to patch it to allow the appropriate syscalls.