1 .\" Copyright (C) 1994, 1995, Daniel Quinlan <quinlan@yggdrasil.com>
2 .\" Copyright (C) 2002-2008, 2017, Michael Kerrisk <mtk.manpages@gmail.com>
3 .\" Copyright (C) 2023, Alejandro Colomar <alx@kernel.org>
5 .\" SPDX-License-Identifier: GPL-3.0-or-later
7 .TH proc_pid_status 5 (date) "Linux man-pages (unreleased)"
9 /proc/pid/status \- memory usage and status information
12 .IR /proc/ pid /status
13 Provides much of the information in
17 in a format that's easier for humans to parse.
22 .RB "$" " cat /proc/$$/status"
31 Uid: 1000 1000 1000 1000
55 HugetlbPages: 0 kB # 4.4
59 SigPnd: 0000000000000000
60 ShdPnd: 0000000000000000
61 SigBlk: 0000000000010000
62 SigIgn: 0000000000384004
63 SigCgt: 000000004b813efb
64 CapInh: 0000000000000000
65 CapPrm: 0000000000000000
66 CapEff: 0000000000000000
67 CapBnd: ffffffffffffffff
68 CapAmb: 0000000000000000
72 Speculation_Store_Bypass: vulnerable
73 Cpus_allowed: 00000001
77 voluntary_ctxt_switches: 150
78 nonvoluntary_ctxt_switches: 545
82 The fields are as follows:
86 Command run by this process.
89 (16) characters (including the terminating null byte) are silently truncated.
92 Process umask, expressed in octal with a leading zero; see
97 Current state of the process.
109 Thread group ID (i.e., Process ID).
112 NUMA group ID (0 if none; since Linux 3.13).
119 PID of parent process.
122 PID of process tracing this process (0 if not being traced).
127 Real, effective, saved set, and filesystem UIDs (GIDs).
130 Number of file descriptor slots currently allocated.
133 Supplementary group list.
136 Thread group ID (i.e., PID) in each of the PID namespaces of which
139 The leftmost entry shows the value with respect to the PID namespace
140 of the process that mounted this procfs (or the root namespace
141 if mounted by the kernel),
142 followed by the value in successively nested inner namespaces.
143 .\" commit e4bc33245124db69b74a6d853ac76c2976f472d5
147 Thread ID in each of the PID namespaces of which
150 The fields are ordered as for
155 Process group ID in each of the PID namespaces of which
158 The fields are ordered as for
163 descendant namespace session ID hierarchy
164 Session ID in each of the PID namespaces of which
167 The fields are ordered as for
172 Peak virtual memory size.
178 Locked memory size (see
183 .\" commit bc3e53f682d93df677dbd5006a404722b3adfe18
185 These are pages that can't be moved because something needs to
186 directly access physical memory.
189 Peak resident set size ("high water mark").
190 This value is inaccurate; see
191 .IR /proc/ pid /statm
196 Note that the value here is the sum of
201 This value is inaccurate; see
202 .IR /proc/ pid /statm
206 Size of resident anonymous memory.
207 .\" commit bf9683d6990589390b5178dafe8fd06808869293
209 This value is inaccurate; see
210 .IR /proc/ pid /statm
214 Size of resident file mappings.
215 .\" commit bf9683d6990589390b5178dafe8fd06808869293
217 This value is inaccurate; see
218 .IR /proc/ pid /statm
222 Size of resident shared memory (includes System V shared memory,
225 and shared anonymous mappings).
226 .\" commit bf9683d6990589390b5178dafe8fd06808869293
234 Size of data, stack, and text segments.
235 This value is inaccurate; see
236 .IR /proc/ pid /statm
240 Shared library code size.
243 Page table entries size (since Linux 2.6.10).
246 .\" commit dc6c9a35b66b520cf67e05d8ca60ebecad3b0479
247 Size of second-level page tables (added in Linux 4.0; removed in Linux 4.15).
250 .\" commit b084d4353ff99d824d3bc5a5c2c22c70b1fba722
251 Swapped-out virtual memory size by anonymous private pages;
252 shmem swap usage is not included (since Linux 2.6.34).
253 This value is inaccurate; see
254 .IR /proc/ pid /statm
258 Size of hugetlb memory portions
259 .\" commit 5d317b2b6536592a9b51fe65faed43d65ca9158e
263 Contains the value 1 if the process is currently dumping core,
265 .\" commit c643401218be0f4ab3522e0c0a63016596d6e9ca
267 This information can be used by a monitoring process to avoid killing
268 a process that is currently dumping core,
269 which could result in a corrupted core dump file.
272 Number of threads in process containing this thread.
275 This field contains two slash-separated numbers that relate to
276 queued signals for the real user ID of this process.
277 The first of these is the number of currently queued
278 signals for this real user ID, and the second is the
279 resource limit on the number of queued signals for this process
280 (see the description of
288 Mask (expressed in hexadecimal)
289 of signals pending for thread and for process as a whole (see
299 Masks (expressed in hexadecimal)
300 indicating signals being blocked, ignored, and caught (see
308 Masks (expressed in hexadecimal)
309 of capabilities enabled in inheritable, permitted, and effective sets
311 .BR capabilities (7)).
314 Capability bounding set, expressed in hexadecimal
315 (since Linux 2.6.26, see
316 .BR capabilities (7)).
319 Ambient capability set, expressed in hexadecimal
320 (since Linux 4.3, see
321 .BR capabilities (7)).
324 .\" commit af884cd4a5ae62fcf5e321fecf0ec1014730353d
328 (since Linux 4.10, see
332 .\" commit 2f4b3bf6b2318cfaa177ec5a802f4d8d6afbd816
333 Seccomp mode of the process
334 (since Linux 3.8, see
337 .BR SECCOMP_MODE_DISABLED ;
339 .BR SECCOMP_MODE_STRICT ;
341 .BR SECCOMP_MODE_FILTER .
342 This field is provided only if the kernel was built with the
344 kernel configuration option enabled.
347 .\" commit c818c03b661cd769e035e41673d5543ba2ebda64
348 Number of seccomp filters attached to the process
349 (since Linux 5.9, see
352 .I Speculation_Store_Bypass
353 .\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
354 Speculation flaw mitigation state
355 (since Linux 4.17, see
359 Hexadecimal mask of CPUs on which this process may run
360 (since Linux 2.6.24, see
364 Same as previous, but in "list format"
365 (since Linux 2.6.26, see
369 Mask of memory nodes allowed to this process
370 (since Linux 2.6.24, see
374 Same as previous, but in "list format"
375 (since Linux 2.6.26, see
378 .I voluntary_ctxt_switches
380 .I nonvoluntary_ctxt_switches
381 Number of voluntary and involuntary context switches (since Linux 2.6.23).