Lines Matching refs:kernel
1 Documentation for /proc/sys/kernel/* kernel version 2.2.10
10 /proc/sys/kernel/ and is valid for Linux kernel version 2.2.
14 kernel. Since some of the files _can_ be used to screw up your
19 show up in /proc/sys/kernel:
114 See Doc*/kernel/power/video.txt, it allows mode of video boot to be
121 This variable has no effect and may be removed in future kernel
138 type_of_loader field in the kernel header; the encoding is kept for
162 Controls the kernel's callhome behavior in case of a kernel panic.
168 nothing happens in case of a kernel panic. If this value is set to "1"
169 the complete kernel oops message is send to the IBM customer service
177 Highest valid capability of the running kernel. Exports
178 CAP_LAST_CAP from the kernel.
210 . If the first character of the pattern is a '|', the kernel will treat
223 /proc/pid directory. In order to do this safely, the kernel must wait
231 are noted via the kernel log and their cores are skipped. 0 is a
259 ever reaches the kernel tty layer, and it's up to the program
267 from using dmesg(8) to view messages from the kernel's log buffer.
272 The kernel config option CONFIG_SECURITY_DMESG_RESTRICT sets the
282 # echo "darkstar" > /proc/sys/kernel/hostname
283 # echo "mydomain" > /proc/sys/kernel/domainname
306 Controls the kernel's behavior when a hung task is detected.
359 exposing kernel addresses via /proc and other interfaces.
363 When kptr_restrict is set to (1), kernel pointers printed using the %pK
368 a setuid binary) then %pK will not leak kernel pointers to unprivileged
372 to protect against uses of %pK in dmesg(8) if leaking kernel pointer
375 When kptr_restrict is set to (2), kernel pointers printed using
383 kernel stack.
397 in an otherwise modular kernel. This toggle defaults to off
413 1) kernel doesn't guarantee, that new object will have desired id. So,
415 2) Toggle with non-default value will be set back to -1 by kernel after
433 The NMI watchdog is disabled by default if the kernel is running as a guest
438 to the guest kernel command line (see Documentation/kernel-parameters.txt).
450 feature is enabled the kernel samples what task thread is accessing memory
459 feature is too high then the rate the kernel samples for NUMA hinting
516 this is the fifth kernel built from this source base and the
517 date behind it indicates the time the kernel was built.
518 The only way to tune these values is to rebuild the kernel :-)
536 The value in this file represents the number of seconds the kernel
544 Controls the kernel's behaviour when an oops or BUG is encountered.
555 Controls the kernel's behavior when detecting the overflows of
556 kernel, IRQ and exception stacks except a user stack.
581 a kernel rebuild when attempting to kdump at the location of a WARN().
591 Hints to the kernel how much CPU time it should be allowed to
606 percentage of CPU. Note: the kernel calculates an
618 PID allocation wrap value. When the kernel's next PID value
628 kernel tries to allocate a number starting from this one.
767 kernel. This value defaults to SHMMAX.
846 Non-zero if the kernel has been tainted. Numeric values, which
864 512 - A kernel warning has occurred.
868 8192 - An unsigned module has been loaded in a kernel supporting module
871 32768 - The kernel has been live patched.
880 During initialization the kernel sets this value such that even if the
900 that time, kernel debugging information is displayed on console.
919 cat /proc/sys/kernel/watchdog