diff options
| author | Michael Kerrisk <mtk.manpages@gmail.com> | 2020-09-24 09:47:55 +0200 |
|---|---|---|
| committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2020-09-24 09:47:55 +0200 |
| commit | 9f5f1b5b8f023b076def768405c17d384bc364db (patch) | |
| tree | 40ec7a3b8df02170045400b9b8f885ca3bc74568 /man2 | |
| parent | 861d36ba31d9146248482e537a23757ab18aee32 (diff) | |
| download | man-pages-9f5f1b5b8f023b076def768405c17d384bc364db.tar.gz | |
ptrace.2: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man2')
| -rw-r--r-- | man2/ptrace.2 | 40 |
1 files changed, 20 insertions, 20 deletions
diff --git a/man2/ptrace.2 b/man2/ptrace.2 index 5524e282e7..fc9b993673 100644 --- a/man2/ptrace.2 +++ b/man2/ptrace.2 @@ -1050,31 +1050,31 @@ The .I ptrace_syscall_info structure contains the following fields: .IP -.in +2n +.in +4n .EX -struct ptrace_syscall_info { - __u8 op; /* Type of system call stop */ - __u32 arch; /* AUDIT_ARCH_* value; see seccomp(2) */ +struct ptrace_syscal_info { + __u8 op; /* Type of system call stop */ + __u32 arch; /* AUDIT_ARCH_* value; see seccomp(2) */ __u64 instruction_pointer; /* CPU instruction pointer */ - __u64 stack_pointer; /* CPU stack pointer */ + __u64 stack_pointer; /* CPU stack pointer */ union { - struct { /* op == PTRACE_SYSCALL_INFO_ENTRY */ - __u64 nr; /* System call number */ - __u64 args[6]; /* System call arguments */ + struct { /* op == PTRACE_SYSCALL_INFO_ENTRY */ + __u64 nr; /* System call number */ + __u64 args[6]; /* System call arguments */ } entry; - struct { /* op == PTRACE_SYSCALL_INFO_EXIT */ - __s64 rval; /* System call return value */ - __u8 is_error; /* System call error flag; - Boolean: does rval contain - an error value (\-ERRCODE) or - a nonerror return value? */ + struct { /* op == PTRACE_SYSCALL_INFO_EXIT */ + __s64 rval; /* System call return value */ + __u8 is_error; /* System call error flag; + Boolean: does rval contain + an error value (\-ERRCODE) or + a nonerror return value? */ } exit; - struct { /* op == PTRACE_SYSCALL_INFO_SECCOMP */ - __u64 nr; /* System call number */ - __u64 args[6]; /* System call arguments */ - __u32 ret_data; /* SECCOMP_RET_DATA portion - of SECCOMP_RET_TRACE - return value */ + struct { /* op == PTRACE_SYSCALL_INFO_SECCOMP */ + __u64 nr; /* System call number */ + __u64 args[6]; /* System call arguments */ + __u32 ret_data; /* SECCOMP_RET_DATA portion + of SECCOMP_RET_TRACE + return value */ } seccomp; }; }; |
