diff options
author | David S. Miller <davem@davemloft.net> | 2009-12-11 20:12:17 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2009-12-11 20:12:17 -0500 |
commit | 501706565b2d4d2d40d0d301d5411ede099b8a6f (patch) | |
tree | 142a18bf1f1e74a09dbfa27540b893ade0fd797d /Documentation/sysctl | |
parent | e93737b0f0159a61772894943199fd3b6f315641 (diff) | |
parent | 2fe77b81c77eed92c4c0439f74c8148a295b4a86 (diff) |
Merge branch 'master' of /home/davem/src/GIT/linux-2.6/
Conflicts:
include/net/tcp.h
Diffstat (limited to 'Documentation/sysctl')
-rw-r--r-- | Documentation/sysctl/kernel.txt | 6 | ||||
-rw-r--r-- | Documentation/sysctl/vm.txt | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index a028b92001ed..8f7a0e73ef44 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt | |||
@@ -139,9 +139,9 @@ core_pattern is used to specify a core dumpfile pattern name. | |||
139 | core_pipe_limit: | 139 | core_pipe_limit: |
140 | 140 | ||
141 | This sysctl is only applicable when core_pattern is configured to pipe core | 141 | This sysctl is only applicable when core_pattern is configured to pipe core |
142 | files to user space helper a (when the first character of core_pattern is a '|', | 142 | files to a user space helper (when the first character of core_pattern is a '|', |
143 | see above). When collecting cores via a pipe to an application, it is | 143 | see above). When collecting cores via a pipe to an application, it is |
144 | occasionally usefull for the collecting application to gather data about the | 144 | occasionally useful for the collecting application to gather data about the |
145 | crashing process from its /proc/pid directory. In order to do this safely, the | 145 | crashing process from its /proc/pid directory. In order to do this safely, the |
146 | kernel must wait for the collecting process to exit, so as not to remove the | 146 | kernel must wait for the collecting process to exit, so as not to remove the |
147 | crashing processes proc files prematurely. This in turn creates the possibility | 147 | crashing processes proc files prematurely. This in turn creates the possibility |
@@ -152,7 +152,7 @@ applications in parallel. If this value is exceeded, then those crashing | |||
152 | processes above that value are noted via the kernel log and their cores are | 152 | processes above that value are noted via the kernel log and their cores are |
153 | skipped. 0 is a special value, indicating that unlimited processes may be | 153 | skipped. 0 is a special value, indicating that unlimited processes may be |
154 | captured in parallel, but that no waiting will take place (i.e. the collecting | 154 | captured in parallel, but that no waiting will take place (i.e. the collecting |
155 | process is not guaranteed access to /proc/<crahing pid>/). This value defaults | 155 | process is not guaranteed access to /proc/<crashing pid>/). This value defaults |
156 | to 0. | 156 | to 0. |
157 | 157 | ||
158 | ============================================================== | 158 | ============================================================== |
diff --git a/Documentation/sysctl/vm.txt b/Documentation/sysctl/vm.txt index a6e360d2055c..fc5790d36cd9 100644 --- a/Documentation/sysctl/vm.txt +++ b/Documentation/sysctl/vm.txt | |||
@@ -370,7 +370,7 @@ The default is 1 percent. | |||
370 | mmap_min_addr | 370 | mmap_min_addr |
371 | 371 | ||
372 | This file indicates the amount of address space which a user process will | 372 | This file indicates the amount of address space which a user process will |
373 | be restricted from mmaping. Since kernel null dereference bugs could | 373 | be restricted from mmapping. Since kernel null dereference bugs could |
374 | accidentally operate based on the information in the first couple of pages | 374 | accidentally operate based on the information in the first couple of pages |
375 | of memory userspace processes should not be allowed to write to them. By | 375 | of memory userspace processes should not be allowed to write to them. By |
376 | default this value is set to 0 and no protections will be enforced by the | 376 | default this value is set to 0 and no protections will be enforced by the |