@@ -48,7 +48,7 @@ fixes/update part 1.1 Stefani Seibold <
[email protected] > June 9 2009
48
48
3.11 /proc/<pid>/patch_state - Livepatch patch operation state
49
49
3.12 /proc/<pid>/arch_status - Task architecture specific information
50
50
3.13 /proc/<pid>/fd - List of symlinks to open files
51
- 3.14 /proc/<pid/ksm_stat - Information about the process' ksm status.
51
+ 3.14 /proc/<pid/ksm_stat - Information about the process's ksm status.
52
52
53
53
4 Configuring procfs
54
54
4.1 Mount options
@@ -485,14 +485,15 @@ Memory Area, or VMA) there is a series of lines such as the following::
485
485
THPeligible: 0
486
486
VmFlags: rd ex mr mw me dw
487
487
488
- The first of these lines shows the same information as is displayed for the
489
- mapping in /proc/PID/maps. Following lines show the size of the mapping
490
- (size); the size of each page allocated when backing a VMA (KernelPageSize),
491
- which is usually the same as the size in the page table entries; the page size
492
- used by the MMU when backing a VMA (in most cases, the same as KernelPageSize);
493
- the amount of the mapping that is currently resident in RAM (RSS); the
494
- process' proportional share of this mapping (PSS); and the number of clean and
495
- dirty shared and private pages in the mapping.
488
+ The first of these lines shows the same information as is displayed for
489
+ the mapping in /proc/PID/maps. Following lines show the size of the
490
+ mapping (size); the size of each page allocated when backing a VMA
491
+ (KernelPageSize), which is usually the same as the size in the page table
492
+ entries; the page size used by the MMU when backing a VMA (in most cases,
493
+ the same as KernelPageSize); the amount of the mapping that is currently
494
+ resident in RAM (RSS); the process's proportional share of this mapping
495
+ (PSS); and the number of clean and dirty shared and private pages in the
496
+ mapping.
496
497
497
498
The "proportional set size" (PSS) of a process is the count of pages it has
498
499
in memory, where each page is divided by the number of processes sharing it.
@@ -2233,8 +2234,8 @@ The number of open files for the process is stored in 'size' member
2233
2234
of stat() output for /proc/<pid>/fd for fast access.
2234
2235
-------------------------------------------------------
2235
2236
2236
- 3.14 /proc/<pid/ksm_stat - Information about the process' ksm status
2237
- --------------------------------------------------------------------
2237
+ 3.14 /proc/<pid/ksm_stat - Information about the process's ksm status
2238
+ ---------------------------------------------------------------------
2238
2239
When CONFIG_KSM is enabled, each process has this file which displays
2239
2240
the information of ksm merging status.
2240
2241
@@ -2288,14 +2289,15 @@ memory consumed.
2288
2289
ksm_merge_any
2289
2290
^^^^^^^^^^^^^
2290
2291
2291
- It specifies whether the process'mm is added by prctl() into the candidate list
2292
- of KSM or not, and if KSM scanning is fully enabled at process level.
2292
+ It specifies whether the process's 'mm is added by prctl() into the
2293
+ candidate list of KSM or not, and if KSM scanning is fully enabled at
2294
+ process level.
2293
2295
2294
2296
ksm_mergeable
2295
2297
^^^^^^^^^^^^^
2296
2298
2297
- It specifies whether any VMAs of the process'mm are currently applicable
2298
- to KSM.
2299
+ It specifies whether any VMAs of the process''s mms are currently
2300
+ applicable to KSM.
2299
2301
2300
2302
More information about KSM can be found in
2301
2303
Documentation/admin-guide/mm/ksm.rst.
@@ -2329,7 +2331,7 @@ arguments are now protected against local eavesdroppers.
2329
2331
hidepid=invisible or hidepid=2 means hidepid=1 plus all /proc/<pid>/ will be
2330
2332
fully invisible to other users. It doesn't mean that it hides a fact whether a
2331
2333
process with a specific pid value exists (it can be learned by other means, e.g.
2332
- by "kill -0 $PID"), but it hides process' uid and gid, which may be learned by
2334
+ by "kill -0 $PID"), but it hides process's uid and gid, which may be learned by
2333
2335
stat()'ing /proc/<pid>/ otherwise. It greatly complicates an intruder's task of
2334
2336
gathering information about running processes, whether some daemon runs with
2335
2337
elevated privileges, whether other user runs some sensitive program, whether
0 commit comments