From 3d08cd331c1adcf0d917392f7e527b3f00511748 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 24 May 2024 06:52:22 +0200 Subject: Merging upstream version 6.8. Signed-off-by: Daniel Baumann --- man5/proc_pid_syscall.5 | 33 --------------------------------- 1 file changed, 33 deletions(-) delete mode 100644 man5/proc_pid_syscall.5 (limited to 'man5/proc_pid_syscall.5') diff --git a/man5/proc_pid_syscall.5 b/man5/proc_pid_syscall.5 deleted file mode 100644 index c569293..0000000 --- a/man5/proc_pid_syscall.5 +++ /dev/null @@ -1,33 +0,0 @@ -.\" Copyright (C) 1994, 1995, Daniel Quinlan -.\" Copyright (C) 2002-2008, 2017, Michael Kerrisk -.\" Copyright (C) 2023, Alejandro Colomar -.\" -.\" SPDX-License-Identifier: GPL-3.0-or-later -.\" -.TH proc_pid_syscall 5 2023-08-15 "Linux man-pages 6.7" -.SH NAME -/proc/pid/syscall \- currently executed system call -.SH DESCRIPTION -.TP -.IR /proc/ pid /syscall " (since Linux 2.6.27)" -.\" commit ebcb67341fee34061430f3367f2e507e52ee051b -This file exposes the system call number and argument registers for the -system call currently being executed by the process, -followed by the values of the stack pointer and program counter registers. -The values of all six argument registers are exposed, -although most system calls use fewer registers. -.IP -If the process is blocked, but not in a system call, -then the file displays \-1 in place of the system call number, -followed by just the values of the stack pointer and program counter. -If process is not blocked, then the file contains just the string "running". -.IP -This file is present only if the kernel was configured with -.BR CONFIG_HAVE_ARCH_TRACEHOOK . -.IP -Permission to access this file is governed by a ptrace access mode -.B PTRACE_MODE_ATTACH_FSCREDS -check; see -.BR ptrace (2). -.SH SEE ALSO -.BR proc (5) -- cgit v1.2.3