Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | Documentation for /proc/sys/kernel/* kernel version 2.2.10 |
| 2 | (c) 1998, 1999, Rik van Riel <riel@nl.linux.org> |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 3 | (c) 2009, Shen Feng<shen@cn.fujitsu.com> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 4 | |
| 5 | For general info and legal blurb, please look in README. |
| 6 | |
| 7 | ============================================================== |
| 8 | |
| 9 | This file contains documentation for the sysctl files in |
| 10 | /proc/sys/kernel/ and is valid for Linux kernel version 2.2. |
| 11 | |
| 12 | The files in this directory can be used to tune and monitor |
| 13 | miscellaneous and general things in the operation of the Linux |
| 14 | kernel. Since some of the files _can_ be used to screw up your |
| 15 | system, it is advisable to read both documentation and source |
| 16 | before actually making adjustments. |
| 17 | |
| 18 | Currently, these files might (depending on your configuration) |
| 19 | show up in /proc/sys/kernel: |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 20 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 21 | - acct |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 22 | - acpi_video_flags |
| 23 | - auto_msgmni |
H. Peter Anvin | d75757a | 2009-12-11 14:23:44 -0800 | [diff] [blame] | 24 | - bootloader_type [ X86 only ] |
| 25 | - bootloader_version [ X86 only ] |
Hans-Joachim Picht | c114728a | 2009-09-11 10:28:47 +0200 | [diff] [blame] | 26 | - callhome [ S390 only ] |
Dan Ballard | 73efc03 | 2011-10-31 17:11:20 -0700 | [diff] [blame] | 27 | - cap_last_cap |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 28 | - core_pattern |
Neil Horman | a293980 | 2009-09-23 15:56:56 -0700 | [diff] [blame] | 29 | - core_pipe_limit |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 30 | - core_uses_pid |
| 31 | - ctrl-alt-del |
Dan Rosenberg | eaf06b2 | 2010-11-11 14:05:18 -0800 | [diff] [blame] | 32 | - dmesg_restrict |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 33 | - domainname |
| 34 | - hostname |
| 35 | - hotplug |
Jiri Kosina | 5553787 | 2015-11-05 18:44:41 -0800 | [diff] [blame] | 36 | - hardlockup_all_cpu_backtrace |
Scott Wood | d22881d | 2017-12-10 01:48:46 -0600 | [diff] [blame] | 37 | - hardlockup_panic |
Aaron Tomlin | 270750db | 2014-01-20 17:34:13 +0000 | [diff] [blame] | 38 | - hung_task_panic |
| 39 | - hung_task_check_count |
| 40 | - hung_task_timeout_secs |
| 41 | - hung_task_warnings |
Kees Cook | 7984754 | 2014-01-23 15:55:59 -0800 | [diff] [blame] | 42 | - kexec_load_disabled |
Dan Rosenberg | 455cd5a | 2011-01-12 16:59:41 -0800 | [diff] [blame] | 43 | - kptr_restrict |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 44 | - l2cr [ PPC only ] |
Michael Opdenacker | ac76cff | 2008-02-13 15:03:32 -0800 | [diff] [blame] | 45 | - modprobe ==> Documentation/debugging-modules.txt |
Kees Cook | 3d43321 | 2009-04-02 15:49:29 -0700 | [diff] [blame] | 46 | - modules_disabled |
Stanislav Kinsbursky | 03f5956 | 2013-01-04 15:34:50 -0800 | [diff] [blame] | 47 | - msg_next_id [ sysv ipc ] |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 48 | - msgmax |
| 49 | - msgmnb |
| 50 | - msgmni |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 51 | - nmi_watchdog |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 52 | - osrelease |
| 53 | - ostype |
| 54 | - overflowgid |
| 55 | - overflowuid |
| 56 | - panic |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 57 | - panic_on_oops |
Mitsuo Hayasaka | 55af779 | 2011-11-29 15:08:36 +0900 | [diff] [blame] | 58 | - panic_on_stackoverflow |
Prarit Bhargava | 9e3961a | 2014-12-10 15:45:50 -0800 | [diff] [blame] | 59 | - panic_on_unrecovered_nmi |
| 60 | - panic_on_warn |
Daniel Bristot de Oliveira | 088e9d2 | 2016-06-02 13:51:41 -0300 | [diff] [blame] | 61 | - panic_on_rcu_stall |
Ben Hutchings | 3379e0c | 2016-01-19 21:35:15 +0000 | [diff] [blame] | 62 | - perf_cpu_time_max_percent |
| 63 | - perf_event_paranoid |
Arnaldo Carvalho de Melo | c5dfd78 | 2016-04-21 12:28:50 -0300 | [diff] [blame] | 64 | - perf_event_max_stack |
Konstantin Khlebnikov | ac0bb6b | 2017-08-20 14:39:20 +0300 | [diff] [blame] | 65 | - perf_event_mlock_kb |
Arnaldo Carvalho de Melo | c85b033 | 2016-05-12 13:06:21 -0300 | [diff] [blame] | 66 | - perf_event_max_contexts_per_stack |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 67 | - pid_max |
| 68 | - powersave-nap [ PPC only ] |
| 69 | - printk |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 70 | - printk_delay |
| 71 | - printk_ratelimit |
| 72 | - printk_ratelimit_burst |
Konstantin Khlebnikov | 8b253b0 | 2016-02-21 10:06:14 +0300 | [diff] [blame] | 73 | - pty ==> Documentation/filesystems/devpts.txt |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 74 | - randomize_va_space |
Mauro Carvalho Chehab | 8c27ceff3 | 2016-10-18 10:12:27 -0200 | [diff] [blame] | 75 | - real-root-dev ==> Documentation/admin-guide/initrd.rst |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 76 | - reboot-cmd [ SPARC only ] |
| 77 | - rtsig-max |
| 78 | - rtsig-nr |
Tyler Hicks | 8e5f1ad | 2017-08-11 04:33:52 +0000 | [diff] [blame] | 79 | - seccomp/ ==> Documentation/userspace-api/seccomp_filter.rst |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 80 | - sem |
Stanislav Kinsbursky | 03f5956 | 2013-01-04 15:34:50 -0800 | [diff] [blame] | 81 | - sem_next_id [ sysv ipc ] |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 82 | - sg-big-buff [ generic SCSI device (sg) ] |
Stanislav Kinsbursky | 03f5956 | 2013-01-04 15:34:50 -0800 | [diff] [blame] | 83 | - shm_next_id [ sysv ipc ] |
Vasiliy Kulikov | b34a6b1 | 2011-07-26 16:08:48 -0700 | [diff] [blame] | 84 | - shm_rmid_forced |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 85 | - shmall |
| 86 | - shmmax [ sysv ipc ] |
| 87 | - shmmni |
Aaron Tomlin | ed23587 | 2014-06-23 13:22:05 -0700 | [diff] [blame] | 88 | - softlockup_all_cpu_backtrace |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 89 | - soft_watchdog |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 90 | - stop-a [ SPARC only ] |
Krzysztof Kozlowski | d3c1a297 | 2017-02-24 10:42:14 +0200 | [diff] [blame] | 91 | - sysrq ==> Documentation/admin-guide/sysrq.rst |
Kees Cook | f4aacea | 2014-06-06 14:37:19 -0700 | [diff] [blame] | 92 | - sysctl_writes_strict |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 93 | - tainted |
| 94 | - threads-max |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 95 | - unknown_nmi_panic |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 96 | - watchdog |
Li Zefan | 08825c9 | 2013-05-17 10:31:20 +0800 | [diff] [blame] | 97 | - watchdog_thresh |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 98 | - version |
| 99 | |
| 100 | ============================================================== |
| 101 | |
| 102 | acct: |
| 103 | |
| 104 | highwater lowwater frequency |
| 105 | |
| 106 | If BSD-style process accounting is enabled these values control |
| 107 | its behaviour. If free space on filesystem where the log lives |
| 108 | goes below <lowwater>% accounting suspends. If free space gets |
| 109 | above <highwater>% accounting resumes. <Frequency> determines |
| 110 | how often do we check the amount of free space (value is in |
| 111 | seconds). Default: |
| 112 | 4 2 30 |
| 113 | That is, suspend accounting if there left <= 2% free; resume it |
| 114 | if we got >=4%; consider information about amount of free space |
| 115 | valid for 30 seconds. |
| 116 | |
| 117 | ============================================================== |
| 118 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 119 | acpi_video_flags: |
| 120 | |
| 121 | flags |
| 122 | |
| 123 | See Doc*/kernel/power/video.txt, it allows mode of video boot to be |
| 124 | set during run time. |
| 125 | |
| 126 | ============================================================== |
| 127 | |
| 128 | auto_msgmni: |
| 129 | |
Manfred Spraul | 0050ee0 | 2014-12-12 16:58:17 -0800 | [diff] [blame] | 130 | This variable has no effect and may be removed in future kernel |
| 131 | releases. Reading it always returns 0. |
| 132 | Up to Linux 3.17, it enabled/disabled automatic recomputing of msgmni |
| 133 | upon memory add/remove or upon ipc namespace creation/removal. |
| 134 | Echoing "1" into this file enabled msgmni automatic recomputing. |
| 135 | Echoing "0" turned it off. auto_msgmni default value was 1. |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 136 | |
| 137 | |
| 138 | ============================================================== |
| 139 | |
H. Peter Anvin | d75757a | 2009-12-11 14:23:44 -0800 | [diff] [blame] | 140 | bootloader_type: |
| 141 | |
| 142 | x86 bootloader identification |
| 143 | |
| 144 | This gives the bootloader type number as indicated by the bootloader, |
| 145 | shifted left by 4, and OR'd with the low four bits of the bootloader |
| 146 | version. The reason for this encoding is that this used to match the |
| 147 | type_of_loader field in the kernel header; the encoding is kept for |
| 148 | backwards compatibility. That is, if the full bootloader type number |
| 149 | is 0x15 and the full version number is 0x234, this file will contain |
| 150 | the value 340 = 0x154. |
| 151 | |
| 152 | See the type_of_loader and ext_loader_type fields in |
| 153 | Documentation/x86/boot.txt for additional information. |
| 154 | |
| 155 | ============================================================== |
| 156 | |
| 157 | bootloader_version: |
| 158 | |
| 159 | x86 bootloader version |
| 160 | |
| 161 | The complete bootloader version number. In the example above, this |
| 162 | file will contain the value 564 = 0x234. |
| 163 | |
| 164 | See the type_of_loader and ext_loader_ver fields in |
| 165 | Documentation/x86/boot.txt for additional information. |
| 166 | |
| 167 | ============================================================== |
| 168 | |
Hans-Joachim Picht | c114728a | 2009-09-11 10:28:47 +0200 | [diff] [blame] | 169 | callhome: |
| 170 | |
| 171 | Controls the kernel's callhome behavior in case of a kernel panic. |
| 172 | |
| 173 | The s390 hardware allows an operating system to send a notification |
| 174 | to a service organization (callhome) in case of an operating system panic. |
| 175 | |
| 176 | When the value in this file is 0 (which is the default behavior) |
| 177 | nothing happens in case of a kernel panic. If this value is set to "1" |
| 178 | the complete kernel oops message is send to the IBM customer service |
| 179 | organization in case the mainframe the Linux operating system is running |
| 180 | on has a service contract with IBM. |
| 181 | |
| 182 | ============================================================== |
| 183 | |
Dan Ballard | 73efc03 | 2011-10-31 17:11:20 -0700 | [diff] [blame] | 184 | cap_last_cap |
| 185 | |
| 186 | Highest valid capability of the running kernel. Exports |
| 187 | CAP_LAST_CAP from the kernel. |
| 188 | |
| 189 | ============================================================== |
| 190 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 191 | core_pattern: |
| 192 | |
| 193 | core_pattern is used to specify a core dumpfile pattern name. |
Matthias Urlichs | cd08104 | 2006-10-11 01:21:57 -0700 | [diff] [blame] | 194 | . max length 128 characters; default value is "core" |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 195 | . core_pattern is used as a pattern template for the output filename; |
| 196 | certain string patterns (beginning with '%') are substituted with |
| 197 | their actual values. |
| 198 | . backward compatibility with core_uses_pid: |
| 199 | If core_pattern does not include "%p" (default does not) |
| 200 | and core_uses_pid is set, then .PID will be appended to |
| 201 | the filename. |
| 202 | . corename format specifiers: |
| 203 | %<NUL> '%' is dropped |
| 204 | %% output one '%' |
| 205 | %p pid |
Stéphane Graber | 65aafb1 | 2013-09-11 14:24:32 -0700 | [diff] [blame] | 206 | %P global pid (init PID namespace) |
Oleg Nesterov | b03023e | 2014-10-13 15:53:35 -0700 | [diff] [blame] | 207 | %i tid |
| 208 | %I global tid (init PID namespace) |
Nicolas Iooss | 5202efe | 2015-06-25 15:03:51 -0700 | [diff] [blame] | 209 | %u uid (in initial user namespace) |
| 210 | %g gid (in initial user namespace) |
Oleg Nesterov | 12a2b4b | 2012-10-04 17:15:25 -0700 | [diff] [blame] | 211 | %d dump mode, matches PR_SET_DUMPABLE and |
| 212 | /proc/sys/fs/suid_dumpable |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 213 | %s signal number |
| 214 | %t UNIX time of dump |
| 215 | %h hostname |
Jiri Slaby | 57cc083 | 2011-05-26 16:25:46 -0700 | [diff] [blame] | 216 | %e executable filename (may be shortened) |
| 217 | %E executable path |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 218 | %<OTHER> both are dropped |
Matthias Urlichs | cd08104 | 2006-10-11 01:21:57 -0700 | [diff] [blame] | 219 | . If the first character of the pattern is a '|', the kernel will treat |
| 220 | the rest of the pattern as a command to run. The core dump will be |
| 221 | written to the standard input of that program instead of to a file. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 222 | |
| 223 | ============================================================== |
| 224 | |
Neil Horman | a293980 | 2009-09-23 15:56:56 -0700 | [diff] [blame] | 225 | core_pipe_limit: |
| 226 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 227 | This sysctl is only applicable when core_pattern is configured to pipe |
| 228 | core files to a user space helper (when the first character of |
| 229 | core_pattern is a '|', see above). When collecting cores via a pipe |
| 230 | to an application, it is occasionally useful for the collecting |
| 231 | application to gather data about the crashing process from its |
| 232 | /proc/pid directory. In order to do this safely, the kernel must wait |
| 233 | for the collecting process to exit, so as not to remove the crashing |
| 234 | processes proc files prematurely. This in turn creates the |
| 235 | possibility that a misbehaving userspace collecting process can block |
| 236 | the reaping of a crashed process simply by never exiting. This sysctl |
| 237 | defends against that. It defines how many concurrent crashing |
| 238 | processes may be piped to user space applications in parallel. If |
| 239 | this value is exceeded, then those crashing processes above that value |
| 240 | are noted via the kernel log and their cores are skipped. 0 is a |
| 241 | special value, indicating that unlimited processes may be captured in |
| 242 | parallel, but that no waiting will take place (i.e. the collecting |
| 243 | process is not guaranteed access to /proc/<crashing pid>/). This |
| 244 | value defaults to 0. |
Neil Horman | a293980 | 2009-09-23 15:56:56 -0700 | [diff] [blame] | 245 | |
| 246 | ============================================================== |
| 247 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 248 | core_uses_pid: |
| 249 | |
| 250 | The default coredump filename is "core". By setting |
| 251 | core_uses_pid to 1, the coredump filename becomes core.PID. |
| 252 | If core_pattern does not include "%p" (default does not) |
| 253 | and core_uses_pid is set, then .PID will be appended to |
| 254 | the filename. |
| 255 | |
| 256 | ============================================================== |
| 257 | |
| 258 | ctrl-alt-del: |
| 259 | |
| 260 | When the value in this file is 0, ctrl-alt-del is trapped and |
| 261 | sent to the init(1) program to handle a graceful restart. |
| 262 | When, however, the value is > 0, Linux's reaction to a Vulcan |
| 263 | Nerve Pinch (tm) will be an immediate reboot, without even |
| 264 | syncing its dirty buffers. |
| 265 | |
| 266 | Note: when a program (like dosemu) has the keyboard in 'raw' |
| 267 | mode, the ctrl-alt-del is intercepted by the program before it |
| 268 | ever reaches the kernel tty layer, and it's up to the program |
| 269 | to decide what to do with it. |
| 270 | |
| 271 | ============================================================== |
| 272 | |
Dan Rosenberg | eaf06b2 | 2010-11-11 14:05:18 -0800 | [diff] [blame] | 273 | dmesg_restrict: |
| 274 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 275 | This toggle indicates whether unprivileged users are prevented |
| 276 | from using dmesg(8) to view messages from the kernel's log buffer. |
| 277 | When dmesg_restrict is set to (0) there are no restrictions. When |
Serge E. Hallyn | 38ef4c2 | 2010-12-08 15:19:01 +0000 | [diff] [blame] | 278 | dmesg_restrict is set set to (1), users must have CAP_SYSLOG to use |
Dan Rosenberg | eaf06b2 | 2010-11-11 14:05:18 -0800 | [diff] [blame] | 279 | dmesg(8). |
| 280 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 281 | The kernel config option CONFIG_SECURITY_DMESG_RESTRICT sets the |
| 282 | default value of dmesg_restrict. |
Dan Rosenberg | eaf06b2 | 2010-11-11 14:05:18 -0800 | [diff] [blame] | 283 | |
| 284 | ============================================================== |
| 285 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 286 | domainname & hostname: |
| 287 | |
| 288 | These files can be used to set the NIS/YP domainname and the |
| 289 | hostname of your box in exactly the same way as the commands |
| 290 | domainname and hostname, i.e.: |
| 291 | # echo "darkstar" > /proc/sys/kernel/hostname |
| 292 | # echo "mydomain" > /proc/sys/kernel/domainname |
| 293 | has the same effect as |
| 294 | # hostname "darkstar" |
| 295 | # domainname "mydomain" |
| 296 | |
| 297 | Note, however, that the classic darkstar.frop.org has the |
| 298 | hostname "darkstar" and DNS (Internet Domain Name Server) |
| 299 | domainname "frop.org", not to be confused with the NIS (Network |
| 300 | Information Service) or YP (Yellow Pages) domainname. These two |
| 301 | domain names are in general different. For a detailed discussion |
| 302 | see the hostname(1) man page. |
| 303 | |
| 304 | ============================================================== |
Jiri Kosina | 5553787 | 2015-11-05 18:44:41 -0800 | [diff] [blame] | 305 | hardlockup_all_cpu_backtrace: |
| 306 | |
| 307 | This value controls the hard lockup detector behavior when a hard |
| 308 | lockup condition is detected as to whether or not to gather further |
| 309 | debug information. If enabled, arch-specific all-CPU stack dumping |
| 310 | will be initiated. |
| 311 | |
| 312 | 0: do nothing. This is the default behavior. |
| 313 | |
| 314 | 1: on detection capture more debug information. |
| 315 | ============================================================== |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 316 | |
Scott Wood | d22881d | 2017-12-10 01:48:46 -0600 | [diff] [blame] | 317 | hardlockup_panic: |
| 318 | |
| 319 | This parameter can be used to control whether the kernel panics |
| 320 | when a hard lockup is detected. |
| 321 | |
| 322 | 0 - don't panic on hard lockup |
| 323 | 1 - panic on hard lockup |
| 324 | |
| 325 | See Documentation/lockup-watchdogs.txt for more information. This can |
| 326 | also be set using the nmi_watchdog kernel parameter. |
| 327 | |
| 328 | ============================================================== |
| 329 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 330 | hotplug: |
| 331 | |
| 332 | Path for the hotplug policy agent. |
| 333 | Default value is "/sbin/hotplug". |
| 334 | |
| 335 | ============================================================== |
| 336 | |
Aaron Tomlin | 270750db | 2014-01-20 17:34:13 +0000 | [diff] [blame] | 337 | hung_task_panic: |
| 338 | |
| 339 | Controls the kernel's behavior when a hung task is detected. |
| 340 | This file shows up if CONFIG_DETECT_HUNG_TASK is enabled. |
| 341 | |
| 342 | 0: continue operation. This is the default behavior. |
| 343 | |
| 344 | 1: panic immediately. |
| 345 | |
| 346 | ============================================================== |
| 347 | |
| 348 | hung_task_check_count: |
| 349 | |
| 350 | The upper bound on the number of tasks that are checked. |
| 351 | This file shows up if CONFIG_DETECT_HUNG_TASK is enabled. |
| 352 | |
| 353 | ============================================================== |
| 354 | |
| 355 | hung_task_timeout_secs: |
| 356 | |
| 357 | Check interval. When a task in D state did not get scheduled |
| 358 | for more than this value report a warning. |
| 359 | This file shows up if CONFIG_DETECT_HUNG_TASK is enabled. |
| 360 | |
| 361 | 0: means infinite timeout - no checking done. |
Liu Hua | 80df284 | 2014-04-07 15:38:57 -0700 | [diff] [blame] | 362 | Possible values to set are in range {0..LONG_MAX/HZ}. |
Aaron Tomlin | 270750db | 2014-01-20 17:34:13 +0000 | [diff] [blame] | 363 | |
| 364 | ============================================================== |
| 365 | |
Aaron Tomlin | 70e0ac5 | 2014-01-27 09:00:57 +0000 | [diff] [blame] | 366 | hung_task_warnings: |
Aaron Tomlin | 270750db | 2014-01-20 17:34:13 +0000 | [diff] [blame] | 367 | |
| 368 | The maximum number of warnings to report. During a check interval |
Aaron Tomlin | 70e0ac5 | 2014-01-27 09:00:57 +0000 | [diff] [blame] | 369 | if a hung task is detected, this value is decreased by 1. |
| 370 | When this value reaches 0, no more warnings will be reported. |
Aaron Tomlin | 270750db | 2014-01-20 17:34:13 +0000 | [diff] [blame] | 371 | This file shows up if CONFIG_DETECT_HUNG_TASK is enabled. |
| 372 | |
| 373 | -1: report an infinite number of warnings. |
| 374 | |
| 375 | ============================================================== |
| 376 | |
Kees Cook | 7984754 | 2014-01-23 15:55:59 -0800 | [diff] [blame] | 377 | kexec_load_disabled: |
| 378 | |
| 379 | A toggle indicating if the kexec_load syscall has been disabled. This |
| 380 | value defaults to 0 (false: kexec_load enabled), but can be set to 1 |
| 381 | (true: kexec_load disabled). Once true, kexec can no longer be used, and |
| 382 | the toggle cannot be set back to false. This allows a kexec image to be |
| 383 | loaded before disabling the syscall, allowing a system to set up (and |
| 384 | later use) an image without it being altered. Generally used together |
| 385 | with the "modules_disabled" sysctl. |
| 386 | |
| 387 | ============================================================== |
| 388 | |
Dan Rosenberg | 455cd5a | 2011-01-12 16:59:41 -0800 | [diff] [blame] | 389 | kptr_restrict: |
| 390 | |
| 391 | This toggle indicates whether restrictions are placed on |
Ryan Mallon | 312b4e2 | 2013-11-12 15:08:51 -0800 | [diff] [blame] | 392 | exposing kernel addresses via /proc and other interfaces. |
| 393 | |
Tobin C. Harding | da27140 | 2017-12-20 08:17:16 +1100 | [diff] [blame] | 394 | When kptr_restrict is set to 0 (the default) the address is hashed before |
| 395 | printing. (This is the equivalent to %p.) |
Ryan Mallon | 312b4e2 | 2013-11-12 15:08:51 -0800 | [diff] [blame] | 396 | |
| 397 | When kptr_restrict is set to (1), kernel pointers printed using the %pK |
| 398 | format specifier will be replaced with 0's unless the user has CAP_SYSLOG |
| 399 | and effective user and group ids are equal to the real ids. This is |
| 400 | because %pK checks are done at read() time rather than open() time, so |
| 401 | if permissions are elevated between the open() and the read() (e.g via |
| 402 | a setuid binary) then %pK will not leak kernel pointers to unprivileged |
| 403 | users. Note, this is a temporary solution only. The correct long-term |
| 404 | solution is to do the permission checks at open() time. Consider removing |
| 405 | world read permissions from files that use %pK, and using dmesg_restrict |
| 406 | to protect against uses of %pK in dmesg(8) if leaking kernel pointer |
| 407 | values to unprivileged users is a concern. |
| 408 | |
| 409 | When kptr_restrict is set to (2), kernel pointers printed using |
| 410 | %pK will be replaced with 0's regardless of privileges. |
Dan Rosenberg | 455cd5a | 2011-01-12 16:59:41 -0800 | [diff] [blame] | 411 | |
| 412 | ============================================================== |
| 413 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 414 | l2cr: (PPC only) |
| 415 | |
| 416 | This flag controls the L2 cache of G3 processor boards. If |
| 417 | 0, the cache is disabled. Enabled if nonzero. |
| 418 | |
| 419 | ============================================================== |
| 420 | |
Kees Cook | 3d43321 | 2009-04-02 15:49:29 -0700 | [diff] [blame] | 421 | modules_disabled: |
| 422 | |
| 423 | A toggle value indicating if modules are allowed to be loaded |
| 424 | in an otherwise modular kernel. This toggle defaults to off |
| 425 | (0), but can be set true (1). Once true, modules can be |
| 426 | neither loaded nor unloaded, and the toggle cannot be set back |
Kees Cook | 7984754 | 2014-01-23 15:55:59 -0800 | [diff] [blame] | 427 | to false. Generally used with the "kexec_load_disabled" toggle. |
Kees Cook | 3d43321 | 2009-04-02 15:49:29 -0700 | [diff] [blame] | 428 | |
| 429 | ============================================================== |
| 430 | |
Stanislav Kinsbursky | 03f5956 | 2013-01-04 15:34:50 -0800 | [diff] [blame] | 431 | msg_next_id, sem_next_id, and shm_next_id: |
| 432 | |
| 433 | These three toggles allows to specify desired id for next allocated IPC |
| 434 | object: message, semaphore or shared memory respectively. |
| 435 | |
| 436 | By default they are equal to -1, which means generic allocation logic. |
| 437 | Possible values to set are in range {0..INT_MAX}. |
| 438 | |
| 439 | Notes: |
| 440 | 1) kernel doesn't guarantee, that new object will have desired id. So, |
| 441 | it's up to userspace, how to handle an object with "wrong" id. |
| 442 | 2) Toggle with non-default value will be set back to -1 by kernel after |
| 443 | successful IPC object allocation. |
| 444 | |
| 445 | ============================================================== |
| 446 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 447 | nmi_watchdog: |
| 448 | |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 449 | This parameter can be used to control the NMI watchdog |
| 450 | (i.e. the hard lockup detector) on x86 systems. |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 451 | |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 452 | 0 - disable the hard lockup detector |
| 453 | 1 - enable the hard lockup detector |
| 454 | |
| 455 | The hard lockup detector monitors each CPU for its ability to respond to |
| 456 | timer interrupts. The mechanism utilizes CPU performance counter registers |
| 457 | that are programmed to generate Non-Maskable Interrupts (NMIs) periodically |
| 458 | while a CPU is busy. Hence, the alternative name 'NMI watchdog'. |
| 459 | |
| 460 | The NMI watchdog is disabled by default if the kernel is running as a guest |
| 461 | in a KVM virtual machine. This default can be overridden by adding |
| 462 | |
| 463 | nmi_watchdog=1 |
| 464 | |
Mauro Carvalho Chehab | 8c27ceff3 | 2016-10-18 10:12:27 -0200 | [diff] [blame] | 465 | to the guest kernel command line (see Documentation/admin-guide/kernel-parameters.rst). |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 466 | |
| 467 | ============================================================== |
| 468 | |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 469 | numa_balancing |
| 470 | |
| 471 | Enables/disables automatic page fault based NUMA memory |
| 472 | balancing. Memory is moved automatically to nodes |
| 473 | that access it often. |
| 474 | |
| 475 | Enables/disables automatic NUMA memory balancing. On NUMA machines, there |
| 476 | is a performance penalty if remote memory is accessed by a CPU. When this |
| 477 | feature is enabled the kernel samples what task thread is accessing memory |
| 478 | by periodically unmapping pages and later trapping a page fault. At the |
| 479 | time of the page fault, it is determined if the data being accessed should |
| 480 | be migrated to a local memory node. |
| 481 | |
| 482 | The unmapping of pages and trapping faults incur additional overhead that |
| 483 | ideally is offset by improved memory locality but there is no universal |
| 484 | guarantee. If the target workload is already bound to NUMA nodes then this |
| 485 | feature should be disabled. Otherwise, if the system overhead from the |
| 486 | feature is too high then the rate the kernel samples for NUMA hinting |
| 487 | faults may be controlled by the numa_balancing_scan_period_min_ms, |
Mel Gorman | 930aa17 | 2013-10-07 11:29:37 +0100 | [diff] [blame] | 488 | numa_balancing_scan_delay_ms, numa_balancing_scan_period_max_ms, |
Rik van Riel | 52bf84a | 2014-01-27 17:03:40 -0500 | [diff] [blame] | 489 | numa_balancing_scan_size_mb, and numa_balancing_settle_count sysctls. |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 490 | |
| 491 | ============================================================== |
| 492 | |
| 493 | numa_balancing_scan_period_min_ms, numa_balancing_scan_delay_ms, |
Mel Gorman | 930aa17 | 2013-10-07 11:29:37 +0100 | [diff] [blame] | 494 | numa_balancing_scan_period_max_ms, numa_balancing_scan_size_mb |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 495 | |
| 496 | Automatic NUMA balancing scans tasks address space and unmaps pages to |
| 497 | detect if pages are properly placed or if the data should be migrated to a |
| 498 | memory node local to where the task is running. Every "scan delay" the task |
| 499 | scans the next "scan size" number of pages in its address space. When the |
| 500 | end of the address space is reached the scanner restarts from the beginning. |
| 501 | |
| 502 | In combination, the "scan delay" and "scan size" determine the scan rate. |
| 503 | When "scan delay" decreases, the scan rate increases. The scan delay and |
| 504 | hence the scan rate of every task is adaptive and depends on historical |
| 505 | behaviour. If pages are properly placed then the scan delay increases, |
| 506 | otherwise the scan delay decreases. The "scan size" is not adaptive but |
| 507 | the higher the "scan size", the higher the scan rate. |
| 508 | |
| 509 | Higher scan rates incur higher system overhead as page faults must be |
| 510 | trapped and potentially data must be migrated. However, the higher the scan |
| 511 | rate, the more quickly a tasks memory is migrated to a local node if the |
| 512 | workload pattern changes and minimises performance impact due to remote |
| 513 | memory accesses. These sysctls control the thresholds for scan delays and |
| 514 | the number of pages scanned. |
| 515 | |
Mel Gorman | 598f0ec | 2013-10-07 11:28:55 +0100 | [diff] [blame] | 516 | numa_balancing_scan_period_min_ms is the minimum time in milliseconds to |
| 517 | scan a tasks virtual memory. It effectively controls the maximum scanning |
| 518 | rate for each task. |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 519 | |
| 520 | numa_balancing_scan_delay_ms is the starting "scan delay" used for a task |
| 521 | when it initially forks. |
| 522 | |
Mel Gorman | 598f0ec | 2013-10-07 11:28:55 +0100 | [diff] [blame] | 523 | numa_balancing_scan_period_max_ms is the maximum time in milliseconds to |
| 524 | scan a tasks virtual memory. It effectively controls the minimum scanning |
| 525 | rate for each task. |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 526 | |
| 527 | numa_balancing_scan_size_mb is how many megabytes worth of pages are |
| 528 | scanned for a given scan. |
| 529 | |
Mel Gorman | 10fc05d | 2013-10-07 11:28:40 +0100 | [diff] [blame] | 530 | ============================================================== |
| 531 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 532 | osrelease, ostype & version: |
| 533 | |
| 534 | # cat osrelease |
| 535 | 2.1.88 |
| 536 | # cat ostype |
| 537 | Linux |
| 538 | # cat version |
| 539 | #5 Wed Feb 25 21:49:24 MET 1998 |
| 540 | |
| 541 | The files osrelease and ostype should be clear enough. Version |
| 542 | needs a little more clarification however. The '#5' means that |
| 543 | this is the fifth kernel built from this source base and the |
| 544 | date behind it indicates the time the kernel was built. |
| 545 | The only way to tune these values is to rebuild the kernel :-) |
| 546 | |
| 547 | ============================================================== |
| 548 | |
| 549 | overflowgid & overflowuid: |
| 550 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 551 | if your architecture did not always support 32-bit UIDs (i.e. arm, |
| 552 | i386, m68k, sh, and sparc32), a fixed UID and GID will be returned to |
| 553 | applications that use the old 16-bit UID/GID system calls, if the |
| 554 | actual UID or GID would exceed 65535. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 555 | |
| 556 | These sysctls allow you to change the value of the fixed UID and GID. |
| 557 | The default is 65534. |
| 558 | |
| 559 | ============================================================== |
| 560 | |
| 561 | panic: |
| 562 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 563 | The value in this file represents the number of seconds the kernel |
| 564 | waits before rebooting on a panic. When you use the software watchdog, |
| 565 | the recommended setting is 60. |
| 566 | |
| 567 | ============================================================== |
| 568 | |
Hidehiro Kawai | 9f318e3 | 2015-12-14 11:19:14 +0100 | [diff] [blame] | 569 | panic_on_io_nmi: |
| 570 | |
| 571 | Controls the kernel's behavior when a CPU receives an NMI caused by |
| 572 | an IO error. |
| 573 | |
| 574 | 0: try to continue operation (default) |
| 575 | |
| 576 | 1: panic immediately. The IO error triggered an NMI. This indicates a |
| 577 | serious system condition which could result in IO data corruption. |
| 578 | Rather than continuing, panicking might be a better choice. Some |
| 579 | servers issue this sort of NMI when the dump button is pushed, |
| 580 | and you can use this option to take a crash dump. |
| 581 | |
| 582 | ============================================================== |
| 583 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 584 | panic_on_oops: |
| 585 | |
| 586 | Controls the kernel's behaviour when an oops or BUG is encountered. |
| 587 | |
| 588 | 0: try to continue operation |
| 589 | |
Matt LaPlante | a982ac0 | 2007-05-09 07:35:06 +0200 | [diff] [blame] | 590 | 1: panic immediately. If the `panic' sysctl is also non-zero then the |
Maxime Bizon | 8b23d04d | 2006-08-05 12:14:32 -0700 | [diff] [blame] | 591 | machine will be rebooted. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 592 | |
| 593 | ============================================================== |
| 594 | |
Mitsuo Hayasaka | 55af779 | 2011-11-29 15:08:36 +0900 | [diff] [blame] | 595 | panic_on_stackoverflow: |
| 596 | |
| 597 | Controls the kernel's behavior when detecting the overflows of |
| 598 | kernel, IRQ and exception stacks except a user stack. |
| 599 | This file shows up if CONFIG_DEBUG_STACKOVERFLOW is enabled. |
| 600 | |
| 601 | 0: try to continue operation. |
| 602 | |
| 603 | 1: panic immediately. |
| 604 | |
| 605 | ============================================================== |
| 606 | |
Prarit Bhargava | 9e3961a | 2014-12-10 15:45:50 -0800 | [diff] [blame] | 607 | panic_on_unrecovered_nmi: |
| 608 | |
| 609 | The default Linux behaviour on an NMI of either memory or unknown is |
| 610 | to continue operation. For many environments such as scientific |
| 611 | computing it is preferable that the box is taken out and the error |
| 612 | dealt with than an uncorrected parity/ECC error get propagated. |
| 613 | |
| 614 | A small number of systems do generate NMI's for bizarre random reasons |
| 615 | such as power management so the default is off. That sysctl works like |
| 616 | the existing panic controls already in that directory. |
| 617 | |
| 618 | ============================================================== |
| 619 | |
| 620 | panic_on_warn: |
| 621 | |
| 622 | Calls panic() in the WARN() path when set to 1. This is useful to avoid |
| 623 | a kernel rebuild when attempting to kdump at the location of a WARN(). |
| 624 | |
| 625 | 0: only WARN(), default behaviour. |
| 626 | |
| 627 | 1: call panic() after printing out WARN() location. |
| 628 | |
| 629 | ============================================================== |
| 630 | |
Daniel Bristot de Oliveira | 088e9d2 | 2016-06-02 13:51:41 -0300 | [diff] [blame] | 631 | panic_on_rcu_stall: |
| 632 | |
| 633 | When set to 1, calls panic() after RCU stall detection messages. This |
| 634 | is useful to define the root cause of RCU stalls using a vmcore. |
| 635 | |
| 636 | 0: do not panic() when RCU stall takes place, default behavior. |
| 637 | |
| 638 | 1: panic() after printing RCU stall messages. |
| 639 | |
| 640 | ============================================================== |
| 641 | |
Dave Hansen | 14c63f1 | 2013-06-21 08:51:36 -0700 | [diff] [blame] | 642 | perf_cpu_time_max_percent: |
| 643 | |
| 644 | Hints to the kernel how much CPU time it should be allowed to |
| 645 | use to handle perf sampling events. If the perf subsystem |
| 646 | is informed that its samples are exceeding this limit, it |
| 647 | will drop its sampling frequency to attempt to reduce its CPU |
| 648 | usage. |
| 649 | |
| 650 | Some perf sampling happens in NMIs. If these samples |
| 651 | unexpectedly take too long to execute, the NMIs can become |
| 652 | stacked up next to each other so much that nothing else is |
| 653 | allowed to execute. |
| 654 | |
| 655 | 0: disable the mechanism. Do not monitor or correct perf's |
| 656 | sampling rate no matter how CPU time it takes. |
| 657 | |
| 658 | 1-100: attempt to throttle perf's sample rate to this |
| 659 | percentage of CPU. Note: the kernel calculates an |
| 660 | "expected" length of each sample event. 100 here means |
| 661 | 100% of that expected length. Even if this is set to |
| 662 | 100, you may still see sample throttling if this |
| 663 | length is exceeded. Set to 0 if you truly do not care |
| 664 | how much CPU is consumed. |
| 665 | |
| 666 | ============================================================== |
| 667 | |
Ben Hutchings | 3379e0c | 2016-01-19 21:35:15 +0000 | [diff] [blame] | 668 | perf_event_paranoid: |
| 669 | |
| 670 | Controls use of the performance events system by unprivileged |
Andy Lutomirski | 0161028 | 2016-05-09 15:48:51 -0700 | [diff] [blame] | 671 | users (without CAP_SYS_ADMIN). The default value is 2. |
Ben Hutchings | 3379e0c | 2016-01-19 21:35:15 +0000 | [diff] [blame] | 672 | |
| 673 | -1: Allow use of (almost) all events by all users |
Konstantin Khlebnikov | ac0bb6b | 2017-08-20 14:39:20 +0300 | [diff] [blame] | 674 | Ignore mlock limit after perf_event_mlock_kb without CAP_IPC_LOCK |
| 675 | >=0: Disallow ftrace function tracepoint by users without CAP_SYS_ADMIN |
| 676 | Disallow raw tracepoint access by users without CAP_SYS_ADMIN |
Ben Hutchings | 3379e0c | 2016-01-19 21:35:15 +0000 | [diff] [blame] | 677 | >=1: Disallow CPU event access by users without CAP_SYS_ADMIN |
| 678 | >=2: Disallow kernel profiling by users without CAP_SYS_ADMIN |
| 679 | |
| 680 | ============================================================== |
Mitsuo Hayasaka | 55af779 | 2011-11-29 15:08:36 +0900 | [diff] [blame] | 681 | |
Arnaldo Carvalho de Melo | c5dfd78 | 2016-04-21 12:28:50 -0300 | [diff] [blame] | 682 | perf_event_max_stack: |
| 683 | |
| 684 | Controls maximum number of stack frames to copy for (attr.sample_type & |
| 685 | PERF_SAMPLE_CALLCHAIN) configured events, for instance, when using |
| 686 | 'perf record -g' or 'perf trace --call-graph fp'. |
| 687 | |
| 688 | This can only be done when no events are in use that have callchains |
| 689 | enabled, otherwise writing to this file will return -EBUSY. |
| 690 | |
| 691 | The default value is 127. |
| 692 | |
| 693 | ============================================================== |
| 694 | |
Konstantin Khlebnikov | ac0bb6b | 2017-08-20 14:39:20 +0300 | [diff] [blame] | 695 | perf_event_mlock_kb: |
| 696 | |
| 697 | Control size of per-cpu ring buffer not counted agains mlock limit. |
| 698 | |
| 699 | The default value is 512 + 1 page |
| 700 | |
| 701 | ============================================================== |
| 702 | |
Arnaldo Carvalho de Melo | c85b033 | 2016-05-12 13:06:21 -0300 | [diff] [blame] | 703 | perf_event_max_contexts_per_stack: |
| 704 | |
| 705 | Controls maximum number of stack frame context entries for |
| 706 | (attr.sample_type & PERF_SAMPLE_CALLCHAIN) configured events, for |
| 707 | instance, when using 'perf record -g' or 'perf trace --call-graph fp'. |
| 708 | |
| 709 | This can only be done when no events are in use that have callchains |
| 710 | enabled, otherwise writing to this file will return -EBUSY. |
| 711 | |
| 712 | The default value is 8. |
| 713 | |
| 714 | ============================================================== |
| 715 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 716 | pid_max: |
| 717 | |
Robert P. J. Day | beb7dd8 | 2007-05-09 07:14:03 +0200 | [diff] [blame] | 718 | PID allocation wrap value. When the kernel's next PID value |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 719 | reaches this value, it wraps back to a minimum PID value. |
| 720 | PIDs of value pid_max or larger are not allocated. |
| 721 | |
| 722 | ============================================================== |
| 723 | |
Pavel Emelyanov | b8f566b | 2012-01-12 17:20:27 -0800 | [diff] [blame] | 724 | ns_last_pid: |
| 725 | |
| 726 | The last pid allocated in the current (the one task using this sysctl |
| 727 | lives in) pid namespace. When selecting a pid for a next task on fork |
| 728 | kernel tries to allocate a number starting from this one. |
| 729 | |
| 730 | ============================================================== |
| 731 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 732 | powersave-nap: (PPC only) |
| 733 | |
| 734 | If set, Linux-PPC will use the 'nap' mode of powersaving, |
| 735 | otherwise the 'doze' mode will be used. |
| 736 | |
| 737 | ============================================================== |
| 738 | |
| 739 | printk: |
| 740 | |
| 741 | The four values in printk denote: console_loglevel, |
| 742 | default_message_loglevel, minimum_console_loglevel and |
| 743 | default_console_loglevel respectively. |
| 744 | |
| 745 | These values influence printk() behavior when printing or |
| 746 | logging error messages. See 'man 2 syslog' for more info on |
| 747 | the different loglevels. |
| 748 | |
| 749 | - console_loglevel: messages with a higher priority than |
| 750 | this will be printed to the console |
Paul Bolle | 87889e1 | 2011-02-06 21:00:41 +0100 | [diff] [blame] | 751 | - default_message_loglevel: messages without an explicit priority |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 752 | will be printed with this priority |
| 753 | - minimum_console_loglevel: minimum (highest) value to which |
| 754 | console_loglevel can be set |
| 755 | - default_console_loglevel: default value for console_loglevel |
| 756 | |
| 757 | ============================================================== |
| 758 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 759 | printk_delay: |
| 760 | |
| 761 | Delay each printk message in printk_delay milliseconds |
| 762 | |
| 763 | Value from 0 - 10000 is allowed. |
| 764 | |
| 765 | ============================================================== |
| 766 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 767 | printk_ratelimit: |
| 768 | |
| 769 | Some warning messages are rate limited. printk_ratelimit specifies |
| 770 | the minimum length of time between these messages (in jiffies), by |
| 771 | default we allow one every 5 seconds. |
| 772 | |
| 773 | A value of 0 will disable rate limiting. |
| 774 | |
| 775 | ============================================================== |
| 776 | |
| 777 | printk_ratelimit_burst: |
| 778 | |
| 779 | While long term we enforce one message per printk_ratelimit |
| 780 | seconds, we do allow a burst of messages to pass through. |
| 781 | printk_ratelimit_burst specifies the number of messages we can |
| 782 | send before ratelimiting kicks in. |
| 783 | |
| 784 | ============================================================== |
| 785 | |
Borislav Petkov | 750afe7 | 2016-08-02 14:04:07 -0700 | [diff] [blame] | 786 | printk_devkmsg: |
| 787 | |
| 788 | Control the logging to /dev/kmsg from userspace: |
| 789 | |
| 790 | ratelimit: default, ratelimited |
| 791 | on: unlimited logging to /dev/kmsg from userspace |
| 792 | off: logging to /dev/kmsg disabled |
| 793 | |
| 794 | The kernel command line parameter printk.devkmsg= overrides this and is |
| 795 | a one-time setting until next reboot: once set, it cannot be changed by |
| 796 | this sysctl interface anymore. |
| 797 | |
| 798 | ============================================================== |
| 799 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 800 | randomize_va_space: |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 801 | |
| 802 | This option can be used to select the type of process address |
| 803 | space randomization that is used in the system, for architectures |
| 804 | that support this feature. |
| 805 | |
Horst Schirmeier | b7f5ab6 | 2009-07-03 14:20:17 +0200 | [diff] [blame] | 806 | 0 - Turn the process address space randomization off. This is the |
| 807 | default for architectures that do not support this feature anyways, |
| 808 | and kernels that are booted with the "norandmaps" parameter. |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 809 | |
| 810 | 1 - Make the addresses of mmap base, stack and VDSO page randomized. |
| 811 | This, among other things, implies that shared libraries will be |
Horst Schirmeier | b7f5ab6 | 2009-07-03 14:20:17 +0200 | [diff] [blame] | 812 | loaded to random addresses. Also for PIE-linked binaries, the |
| 813 | location of code start is randomized. This is the default if the |
| 814 | CONFIG_COMPAT_BRK option is enabled. |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 815 | |
Horst Schirmeier | b7f5ab6 | 2009-07-03 14:20:17 +0200 | [diff] [blame] | 816 | 2 - Additionally enable heap randomization. This is the default if |
| 817 | CONFIG_COMPAT_BRK is disabled. |
| 818 | |
| 819 | There are a few legacy applications out there (such as some ancient |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 820 | versions of libc.so.5 from 1996) that assume that brk area starts |
Horst Schirmeier | b7f5ab6 | 2009-07-03 14:20:17 +0200 | [diff] [blame] | 821 | just after the end of the code+bss. These applications break when |
| 822 | start of the brk area is randomized. There are however no known |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 823 | non-legacy applications that would be broken this way, so for most |
Horst Schirmeier | b7f5ab6 | 2009-07-03 14:20:17 +0200 | [diff] [blame] | 824 | systems it is safe to choose full randomization. |
| 825 | |
| 826 | Systems with ancient and/or broken binaries should be configured |
| 827 | with CONFIG_COMPAT_BRK enabled, which excludes the heap from process |
| 828 | address space randomization. |
Jiri Kosina | 1ec7fd5 | 2008-02-09 23:24:08 +0100 | [diff] [blame] | 829 | |
| 830 | ============================================================== |
| 831 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 832 | reboot-cmd: (Sparc only) |
| 833 | |
| 834 | ??? This seems to be a way to give an argument to the Sparc |
| 835 | ROM/Flash boot loader. Maybe to tell it what to do after |
| 836 | rebooting. ??? |
| 837 | |
| 838 | ============================================================== |
| 839 | |
| 840 | rtsig-max & rtsig-nr: |
| 841 | |
| 842 | The file rtsig-max can be used to tune the maximum number |
| 843 | of POSIX realtime (queued) signals that can be outstanding |
| 844 | in the system. |
| 845 | |
| 846 | rtsig-nr shows the number of RT signals currently queued. |
| 847 | |
| 848 | ============================================================== |
| 849 | |
Mel Gorman | cb25176 | 2016-02-05 09:08:36 +0000 | [diff] [blame] | 850 | sched_schedstats: |
| 851 | |
| 852 | Enables/disables scheduler statistics. Enabling this feature |
| 853 | incurs a small amount of overhead in the scheduler but is |
| 854 | useful for debugging and performance tuning. |
| 855 | |
| 856 | ============================================================== |
| 857 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 858 | sg-big-buff: |
| 859 | |
| 860 | This file shows the size of the generic SCSI (sg) buffer. |
| 861 | You can't tune it just yet, but you could change it on |
| 862 | compile time by editing include/scsi/sg.h and changing |
| 863 | the value of SG_BIG_BUFF. |
| 864 | |
| 865 | There shouldn't be any reason to change this value. If |
| 866 | you can come up with one, you probably know what you |
| 867 | are doing anyway :) |
| 868 | |
| 869 | ============================================================== |
| 870 | |
Carlos Alberto Lopez Perez | 358e419 | 2013-01-04 15:35:05 -0800 | [diff] [blame] | 871 | shmall: |
| 872 | |
| 873 | This parameter sets the total amount of shared memory pages that |
| 874 | can be used system wide. Hence, SHMALL should always be at least |
| 875 | ceil(shmmax/PAGE_SIZE). |
| 876 | |
| 877 | If you are not sure what the default PAGE_SIZE is on your Linux |
| 878 | system, you can run the following command: |
| 879 | |
| 880 | # getconf PAGE_SIZE |
| 881 | |
| 882 | ============================================================== |
| 883 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 884 | shmmax: |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 885 | |
| 886 | This value can be used to query and set the run time limit |
| 887 | on the maximum shared memory segment size that can be created. |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 888 | Shared memory segments up to 1Gb are now supported in the |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 889 | kernel. This value defaults to SHMMAX. |
| 890 | |
| 891 | ============================================================== |
| 892 | |
Vasiliy Kulikov | b34a6b1 | 2011-07-26 16:08:48 -0700 | [diff] [blame] | 893 | shm_rmid_forced: |
| 894 | |
| 895 | Linux lets you set resource limits, including how much memory one |
| 896 | process can consume, via setrlimit(2). Unfortunately, shared memory |
| 897 | segments are allowed to exist without association with any process, and |
| 898 | thus might not be counted against any resource limits. If enabled, |
| 899 | shared memory segments are automatically destroyed when their attach |
| 900 | count becomes zero after a detach or a process termination. It will |
| 901 | also destroy segments that were created, but never attached to, on exit |
| 902 | from the process. The only use left for IPC_RMID is to immediately |
| 903 | destroy an unattached segment. Of course, this breaks the way things are |
| 904 | defined, so some applications might stop working. Note that this |
| 905 | feature will do you no good unless you also configure your resource |
| 906 | limits (in particular, RLIMIT_AS and RLIMIT_NPROC). Most systems don't |
| 907 | need this. |
| 908 | |
| 909 | Note that if you change this from 0 to 1, already created segments |
| 910 | without users and with a dead originative process will be destroyed. |
| 911 | |
| 912 | ============================================================== |
| 913 | |
Kees Cook | f4aacea | 2014-06-06 14:37:19 -0700 | [diff] [blame] | 914 | sysctl_writes_strict: |
| 915 | |
| 916 | Control how file position affects the behavior of updating sysctl values |
| 917 | via the /proc/sys interface: |
| 918 | |
| 919 | -1 - Legacy per-write sysctl value handling, with no printk warnings. |
| 920 | Each write syscall must fully contain the sysctl value to be |
| 921 | written, and multiple writes on the same sysctl file descriptor |
| 922 | will rewrite the sysctl value, regardless of file position. |
Kees Cook | 41662f5 | 2016-01-20 15:00:45 -0800 | [diff] [blame] | 923 | 0 - Same behavior as above, but warn about processes that perform writes |
| 924 | to a sysctl file descriptor when the file position is not 0. |
| 925 | 1 - (default) Respect file position when writing sysctl strings. Multiple |
| 926 | writes will append to the sysctl value buffer. Anything past the max |
| 927 | length of the sysctl value buffer will be ignored. Writes to numeric |
| 928 | sysctl entries must always be at file position 0 and the value must |
| 929 | be fully contained in the buffer sent in the write syscall. |
Kees Cook | f4aacea | 2014-06-06 14:37:19 -0700 | [diff] [blame] | 930 | |
| 931 | ============================================================== |
| 932 | |
Aaron Tomlin | ed23587 | 2014-06-23 13:22:05 -0700 | [diff] [blame] | 933 | softlockup_all_cpu_backtrace: |
| 934 | |
| 935 | This value controls the soft lockup detector thread's behavior |
| 936 | when a soft lockup condition is detected as to whether or not |
| 937 | to gather further debug information. If enabled, each cpu will |
| 938 | be issued an NMI and instructed to capture stack trace. |
| 939 | |
| 940 | This feature is only applicable for architectures which support |
| 941 | NMI. |
| 942 | |
| 943 | 0: do nothing. This is the default behavior. |
| 944 | |
| 945 | 1: on detection capture more debug information. |
| 946 | |
| 947 | ============================================================== |
| 948 | |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 949 | soft_watchdog |
| 950 | |
| 951 | This parameter can be used to control the soft lockup detector. |
| 952 | |
| 953 | 0 - disable the soft lockup detector |
| 954 | 1 - enable the soft lockup detector |
| 955 | |
| 956 | The soft lockup detector monitors CPUs for threads that are hogging the CPUs |
| 957 | without rescheduling voluntarily, and thus prevent the 'watchdog/N' threads |
| 958 | from running. The mechanism depends on the CPUs ability to respond to timer |
| 959 | interrupts which are needed for the 'watchdog/N' threads to be woken up by |
| 960 | the watchdog timer function, otherwise the NMI watchdog - if enabled - can |
| 961 | detect a hard lockup condition. |
| 962 | |
| 963 | ============================================================== |
| 964 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 965 | tainted: |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 966 | |
Kees Cook | 9c4560e | 2018-04-10 16:32:29 -0700 | [diff] [blame] | 967 | Non-zero if the kernel has been tainted. Numeric values, which can be |
| 968 | ORed together. The letters are seen in "Tainted" line of Oops reports. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 969 | |
Kees Cook | 9c4560e | 2018-04-10 16:32:29 -0700 | [diff] [blame] | 970 | 1 (P): A module with a non-GPL license has been loaded, this |
| 971 | includes modules with no license. |
| 972 | Set by modutils >= 2.4.9 and module-init-tools. |
| 973 | 2 (F): A module was force loaded by insmod -f. |
| 974 | Set by modutils >= 2.4.9 and module-init-tools. |
| 975 | 4 (S): Unsafe SMP processors: SMP with CPUs not designed for SMP. |
| 976 | 8 (R): A module was forcibly unloaded from the system by rmmod -f. |
| 977 | 16 (M): A hardware machine check error occurred on the system. |
| 978 | 32 (B): A bad page was discovered on the system. |
| 979 | 64 (U): The user has asked that the system be marked "tainted". This |
| 980 | could be because they are running software that directly modifies |
| 981 | the hardware, or for other reasons. |
| 982 | 128 (D): The system has died. |
| 983 | 256 (A): The ACPI DSDT has been overridden with one supplied by the user |
| 984 | instead of using the one provided by the hardware. |
| 985 | 512 (W): A kernel warning has occurred. |
| 986 | 1024 (C): A module from drivers/staging was loaded. |
| 987 | 2048 (I): The system is working around a severe firmware bug. |
| 988 | 4096 (O): An out-of-tree module has been loaded. |
| 989 | 8192 (E): An unsigned module has been loaded in a kernel supporting module |
| 990 | signature. |
| 991 | 16384 (L): A soft lockup has previously occurred on the system. |
| 992 | 32768 (K): The kernel has been live patched. |
| 993 | 65536 (X): Auxiliary taint, defined and used by for distros. |
Kees Cook | bc4f2f5 | 2018-04-10 16:32:33 -0700 | [diff] [blame] | 994 | 131072 (T): The kernel was built with the struct randomization plugin. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 995 | |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 996 | ============================================================== |
| 997 | |
Heinrich Schuchardt | 0ec62af | 2015-04-16 12:47:53 -0700 | [diff] [blame] | 998 | threads-max |
| 999 | |
| 1000 | This value controls the maximum number of threads that can be created |
| 1001 | using fork(). |
| 1002 | |
| 1003 | During initialization the kernel sets this value such that even if the |
| 1004 | maximum number of threads is created, the thread structures occupy only |
| 1005 | a part (1/8th) of the available RAM pages. |
| 1006 | |
| 1007 | The minimum value that can be written to threads-max is 20. |
| 1008 | The maximum value that can be written to threads-max is given by the |
| 1009 | constant FUTEX_TID_MASK (0x3fffffff). |
| 1010 | If a value outside of this range is written to threads-max an error |
| 1011 | EINVAL occurs. |
| 1012 | |
| 1013 | The value written is checked against the available RAM pages. If the |
| 1014 | thread structures would occupy too much (more than 1/8th) of the |
| 1015 | available RAM pages threads-max is reduced accordingly. |
| 1016 | |
| 1017 | ============================================================== |
| 1018 | |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 1019 | unknown_nmi_panic: |
| 1020 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 1021 | The value in this file affects behavior of handling NMI. When the |
| 1022 | value is non-zero, unknown NMI is trapped and then panic occurs. At |
| 1023 | that time, kernel debugging information is displayed on console. |
Shen Feng | 760df93 | 2009-04-02 16:57:20 -0700 | [diff] [blame] | 1024 | |
Borislav Petkov | 807094c | 2011-07-23 10:39:29 -0700 | [diff] [blame] | 1025 | NMI switch that most IA32 servers have fires unknown NMI up, for |
| 1026 | example. If a system hangs up, try pressing the NMI switch. |
Li Zefan | 08825c9 | 2013-05-17 10:31:20 +0800 | [diff] [blame] | 1027 | |
| 1028 | ============================================================== |
| 1029 | |
Ulrich Obergfell | 195daf6 | 2015-04-14 15:44:13 -0700 | [diff] [blame] | 1030 | watchdog: |
| 1031 | |
| 1032 | This parameter can be used to disable or enable the soft lockup detector |
| 1033 | _and_ the NMI watchdog (i.e. the hard lockup detector) at the same time. |
| 1034 | |
| 1035 | 0 - disable both lockup detectors |
| 1036 | 1 - enable both lockup detectors |
| 1037 | |
| 1038 | The soft lockup detector and the NMI watchdog can also be disabled or |
| 1039 | enabled individually, using the soft_watchdog and nmi_watchdog parameters. |
| 1040 | If the watchdog parameter is read, for example by executing |
| 1041 | |
| 1042 | cat /proc/sys/kernel/watchdog |
| 1043 | |
| 1044 | the output of this command (0 or 1) shows the logical OR of soft_watchdog |
| 1045 | and nmi_watchdog. |
| 1046 | |
| 1047 | ============================================================== |
| 1048 | |
Chris Metcalf | fe4ba3c3 | 2015-06-24 16:55:45 -0700 | [diff] [blame] | 1049 | watchdog_cpumask: |
| 1050 | |
| 1051 | This value can be used to control on which cpus the watchdog may run. |
| 1052 | The default cpumask is all possible cores, but if NO_HZ_FULL is |
| 1053 | enabled in the kernel config, and cores are specified with the |
| 1054 | nohz_full= boot argument, those cores are excluded by default. |
| 1055 | Offline cores can be included in this mask, and if the core is later |
| 1056 | brought online, the watchdog will be started based on the mask value. |
| 1057 | |
| 1058 | Typically this value would only be touched in the nohz_full case |
| 1059 | to re-enable cores that by default were not running the watchdog, |
| 1060 | if a kernel lockup was suspected on those cores. |
| 1061 | |
| 1062 | The argument value is the standard cpulist format for cpumasks, |
| 1063 | so for example to enable the watchdog on cores 0, 2, 3, and 4 you |
| 1064 | might say: |
| 1065 | |
| 1066 | echo 0,2-4 > /proc/sys/kernel/watchdog_cpumask |
| 1067 | |
| 1068 | ============================================================== |
| 1069 | |
Li Zefan | 08825c9 | 2013-05-17 10:31:20 +0800 | [diff] [blame] | 1070 | watchdog_thresh: |
| 1071 | |
| 1072 | This value can be used to control the frequency of hrtimer and NMI |
| 1073 | events and the soft and hard lockup thresholds. The default threshold |
| 1074 | is 10 seconds. |
| 1075 | |
| 1076 | The softlockup threshold is (2 * watchdog_thresh). Setting this |
| 1077 | tunable to zero will disable lockup detection altogether. |
| 1078 | |
| 1079 | ============================================================== |