diff options
| author | Alejandro Colomar <alx@kernel.org> | 2023-08-15 01:40:26 +0200 |
|---|---|---|
| committer | Alejandro Colomar <alx@kernel.org> | 2023-08-15 23:13:44 +0200 |
| commit | 987b57952b110884c2138c357a04f58d7f8e374f (patch) | |
| tree | 8e38dc7215c46b17c17b9586cbae29124109ea7a | |
| parent | 5be596391823bcf948ee44fb1d4df1a9b4f12fb7 (diff) | |
| download | man-pages-987b57952b110884c2138c357a04f58d7f8e374f.tar.gz | |
proc.5, proc_pid_syscall.5: Split /proc/PID/syscall from proc(5)
Signed-off-by: Alejandro Colomar <alx@kernel.org>
| -rw-r--r-- | man5/proc.5 | 21 | ||||
| -rw-r--r-- | man5/proc_pid_syscall.5 | 33 |
2 files changed, 33 insertions, 21 deletions
diff --git a/man5/proc.5 b/man5/proc.5 index 7a059b7cd7..48e98f5407 100644 --- a/man5/proc.5 +++ b/man5/proc.5 @@ -284,27 +284,6 @@ making any desired changes to the process's effective UID or GID. .\" Added in Linux 2.6.9 .\" CONFIG_SCHEDSTATS .TP -.IR /proc/ pid /syscall " (since Linux 2.6.27)" -.\" commit ebcb67341fee34061430f3367f2e507e52ee051b -This file exposes the system call number and argument registers for the -system call currently being executed by the process, -followed by the values of the stack pointer and program counter registers. -The values of all six argument registers are exposed, -although most system calls use fewer registers. -.IP -If the process is blocked, but not in a system call, -then the file displays \-1 in place of the system call number, -followed by just the values of the stack pointer and program counter. -If process is not blocked, then the file contains just the string "running". -.IP -This file is present only if the kernel was configured with -.BR CONFIG_HAVE_ARCH_TRACEHOOK . -.IP -Permission to access this file is governed by a ptrace access mode -.B PTRACE_MODE_ATTACH_FSCREDS -check; see -.BR ptrace (2). -.TP .IR /proc/ pid /task " (since Linux 2.6.0)" .\" Precisely: Linux 2.6.0-test6 This is a directory that contains one subdirectory diff --git a/man5/proc_pid_syscall.5 b/man5/proc_pid_syscall.5 new file mode 100644 index 0000000000..1b2aa682bb --- /dev/null +++ b/man5/proc_pid_syscall.5 @@ -0,0 +1,33 @@ +.\" Copyright (C) 1994, 1995, Daniel Quinlan <quinlan@yggdrasil.com> +.\" Copyright (C) 2002-2008, 2017, Michael Kerrisk <mtk.manpages@gmail.com> +.\" Copyright (C) 2023, Alejandro Colomar <alx@kernel.org> +.\" +.\" SPDX-License-Identifier: GPL-3.0-or-later +.\" +.TH proc_pid_syscall 5 (date) "Linux man-pages (unreleased)" +.SH NAME +/proc/pid/syscall \- currently executed system call +.SH DESCRIPTION +.TP +.IR /proc/ pid /syscall " (since Linux 2.6.27)" +.\" commit ebcb67341fee34061430f3367f2e507e52ee051b +This file exposes the system call number and argument registers for the +system call currently being executed by the process, +followed by the values of the stack pointer and program counter registers. +The values of all six argument registers are exposed, +although most system calls use fewer registers. +.IP +If the process is blocked, but not in a system call, +then the file displays \-1 in place of the system call number, +followed by just the values of the stack pointer and program counter. +If process is not blocked, then the file contains just the string "running". +.IP +This file is present only if the kernel was configured with +.BR CONFIG_HAVE_ARCH_TRACEHOOK . +.IP +Permission to access this file is governed by a ptrace access mode +.B PTRACE_MODE_ATTACH_FSCREDS +check; see +.BR ptrace (2). +.SH SEE ALSO +.BR proc (5) |
