• Home
  • Raw
  • Download

Lines Matching +full:no +full:- +full:unaligned +full:- +full:direct +full:- +full:access

5 .. See scripts/check-sysctl-docs to keep this up to date
13 Documentation/admin-guide/sysctl/index.rst.
15 ------------------------------------------------------------------------------
39 If BSD-style process accounting is enabled these values control
71 The machine hardware name, the same output as ``uname -m``
77 This variable has no effect and may be removed in future kernel
129 Ctrl-Alt-Delete). Writing a value to this file which doesn't
130 correspond to a running process will result in ``-ESRCH``.
132 See also `ctrl-alt-del`_.
209 captured in parallel, but that no waiting will take place (i.e. the
210 collecting process is not guaranteed access to ``/proc/<crashing
236 ctrl-alt-del
239 When the value in this file is 0, ctrl-alt-del is trapped and
247 mode, the ctrl-alt-del is intercepted by the program before it
258 When ``dmesg_restrict`` is set to 0 there are no restrictions.
303 See Documentation/driver-api/firmware/fallback-mechanisms.rst.
357 debug information. If enabled, arch-specific all-CPU stack dumping
377 See Documentation/admin-guide/lockup-watchdogs.rst for more information.
389 modern systems rely exclusively on the netlink-based uevent source and
403 1: Will non-maskably interrupt all CPUs and dump their backtraces when
433 0 means infinite timeout, no checking is done.
457 When this value reaches 0, no more warnings will be reported.
460 -1: report an infinite number of warnings.
466 Controls whether the panic kmsg data should be reported to Hyper-V.
474 ignore-unaligned-usertrap
477 On architectures where unaligned accesses cause traps, and where this
480 unaligned traps are logged.
483 0 Log all unaligned accesses.
488 See also `unaligned-trap`_.
500 -EPERM) for unprivileged processes not in the io_uring_group group.
504 always fails with -EPERM. Existing io_uring instances can still be
514 to create an io_uring instance. If io_uring_group is set to -1 (the
526 Once true, kexec can no longer be used, and the toggle cannot be set
542 -1 Unlimited calls to kexec. This is the default setting.
571 The correct long-term solution is to do the permission checks at
592 This sysctl only affects module autoloading. It has no effect on the
647 By default they are equal to -1, which means generic allocation logic.
653 2) Toggle with non-default value will be set back to -1 by kernel after
655 fails, it is undefined if the value remains unmodified or is reset to -1.
679 that are programmed to generate Non-Maskable Interrupts (NMIs) periodically
688 Documentation/admin-guide/kernel-parameters.rst).
699 A value of 0 means no change. The default value is 200 meaning the NMI
707 balancing. Memory is moved automatically to nodes that access it often.
725 ideally is offset by improved memory locality but there is no universal
739 promotion throughput. The per-node max promotion throughput in MB/s
740 will be limited to be no more than the set value.
757 1: Will non-maskably interrupt all CPUs and dump their backtraces when
787 The only way to tune these values is to rebuild the kernel :-)
793 if your architecture did not always support 32-bit UIDs (i.e. arm,
795 applications that use the old 16-bit UID/GID system calls, if the
839 1 Panic immediately. If the `panic` sysctl is also non-zero then the
921 When ``panic_on_rcu_stall`` is set to 0, this value is has no effect.
939 sampling rate no matter how CPU time it takes.
941 1-100 Attempt to throttle perf's sample rate to this
957 For backward compatibility reasons access to system performance
964 -1 Allow use of (almost) all events by all users.
972 Disallow raw tracepoint access by users without ``CAP_PERFMON``.
974 >=1 Disallow CPU event access by users without ``CAP_PERFMON``.
985 '``perf record -g``' or '``perf trace --call-graph fp``'.
987 This can only be done when no events are in use that have callchains
988 enabled, otherwise writing to this file will return ``-EBUSY``.
996 Control size of per-cpu ring buffer not counted against mlock limit.
1006 instance, when using '``perf record -g``' or '``perf trace --call-graph fp``'.
1008 This can only be done when no events are in use that have callchains
1009 enabled, otherwise writing to this file will return ``-EBUSY``.
1017 Controls user space access for reading perf event counters.
1022 The default value is 0 (access disabled).
1032 When set to 0, user space access is disabled.
1035 registers through perf, any direct access without perf intervention will trigger
1038 When set to 2, which enables legacy mode (user space has direct access to cycle
1060 powersave-nap (PPC only)
1063 If set, Linux-PPC will use the 'nap' mode of powersaving,
1096 Value from 0 - 10000 is allowed.
1132 a one-time setting until next reboot: once set, it cannot be changed by
1161 writable for compatibility purposes, but writing to it has no effect
1167 writing to it has no effect on any RNG behavior.
1184 loaded to random addresses. Also for PIE-linked binaries, the
1194 start of the brk area is randomized. There are however no known
1195 non-legacy applications that would be broken this way, so for most
1204 real-root-dev
1207 See Documentation/admin-guide/initrd.rst.
1210 reboot-cmd (SPARC only)
1226 this value to 0. On Non-EAS platforms, write operation fails and
1233 Documentation/accounting/delay-accounting.rst. Enabling this feature incurs
1302 See Documentation/userspace-api/seccomp_filter.rst.
1305 sg-big-buff
1365 feature will do you no good unless you also configure your resource
1380 -1 Legacy per-write sysctl value handling, with no printk warnings.
1446 On x86, each "split lock" imposes a system-wide performance penalty. On larger
1448 denials of service to well-behaved and potentially more important users.
1459 0 Disable the mitigation mode - just warns the split lock on kernel log
1461 1 Enable the mitigation mode (this is the default) - penalizes the split
1484 stop-a (SPARC only)
1487 Controls Stop-A:
1490 0 Stop-A has no effect.
1491 1 Stop-A breaks to the PROM (default).
1494 Stop-A is always enabled on a panic, so that the user can return to
1501 See Documentation/admin-guide/sysrq.rst.
1507 Non-zero if the kernel has been tainted. Numeric values, which can be
1523 4096 `(O)` externally-built ("out-of-tree") module was loaded
1531 See Documentation/admin-guide/tainted-kernels.rst for more information.
1538 See Documentation/admin-guide/kernel-parameters.rst for more details on
1542 threads-max
1552 The minimum value that can be written to ``threads-max`` is 1.
1554 The maximum value that can be written to ``threads-max`` is given by the
1557 If a value outside of this range is written to ``threads-max`` an
1584 See Documentation/admin-guide/kernel-parameters.rst and
1585 Documentation/trace/boottime-trace.rst.
1588 unaligned-trap
1591 On architectures where unaligned accesses cause traps, and where this
1593 ``arc``, ``parisc`` and ``loongarch``), controls whether unaligned traps
1597 0 Do not emulate unaligned accesses.
1598 1 Emulate unaligned accesses. This is the default setting.
1601 See also `ignore-unaligned-usertrap`_.
1608 value is non-zero, unknown NMI is trapped and then panic occurs. At
1620 will return ``-EPERM``. Once set to 1, this can't be cleared from the
1679 to re-enable cores that by default were not running the watchdog,
1686 echo 0,2-4 > /proc/sys/kernel/watchdog_cpumask