Lines Matching refs:kernel
1 Documentation for /proc/sys/kernel/* kernel version 2.2.10
10 /proc/sys/kernel/ and is valid for Linux kernel version 2.2.
14 kernel. Since some of the files _can_ be used to screw up your
19 show up in /proc/sys/kernel:
115 See Doc*/kernel/power/video.txt, it allows mode of video boot to be
122 This variable has no effect and may be removed in future kernel
139 type_of_loader field in the kernel header; the encoding is kept for
163 Controls the kernel's callhome behavior in case of a kernel panic.
169 nothing happens in case of a kernel panic. If this value is set to "1"
170 the complete kernel oops message is send to the IBM customer service
178 Highest valid capability of the running kernel. Exports
179 CAP_LAST_CAP from the kernel.
211 . If the first character of the pattern is a '|', the kernel will treat
224 /proc/pid directory. In order to do this safely, the kernel must wait
232 are noted via the kernel log and their cores are skipped. 0 is a
260 ever reaches the kernel tty layer, and it's up to the program
268 from using dmesg(8) to view messages from the kernel's log buffer.
273 The kernel config option CONFIG_SECURITY_DMESG_RESTRICT sets the
283 # echo "darkstar" > /proc/sys/kernel/hostname
284 # echo "mydomain" > /proc/sys/kernel/domainname
318 Controls the kernel's behavior when a hung task is detected.
371 exposing kernel addresses via /proc and other interfaces.
375 When kptr_restrict is set to (1), kernel pointers printed using the %pK
380 a setuid binary) then %pK will not leak kernel pointers to unprivileged
384 to protect against uses of %pK in dmesg(8) if leaking kernel pointer
387 When kptr_restrict is set to (2), kernel pointers printed using
395 kernel stack.
409 in an otherwise modular kernel. This toggle defaults to off
425 1) kernel doesn't guarantee, that new object will have desired id. So,
427 2) Toggle with non-default value will be set back to -1 by kernel after
445 The NMI watchdog is disabled by default if the kernel is running as a guest
450 to the guest kernel command line (see Documentation/kernel-parameters.txt).
462 feature is enabled the kernel samples what task thread is accessing memory
471 feature is too high then the rate the kernel samples for NUMA hinting
528 this is the fifth kernel built from this source base and the
529 date behind it indicates the time the kernel was built.
530 The only way to tune these values is to rebuild the kernel :-)
548 The value in this file represents the number of seconds the kernel
556 Controls the kernel's behaviour when an oops or BUG is encountered.
567 Controls the kernel's behavior when detecting the overflows of
568 kernel, IRQ and exception stacks except a user stack.
593 a kernel rebuild when attempting to kdump at the location of a WARN().
603 Hints to the kernel how much CPU time it should be allowed to
618 percentage of CPU. Note: the kernel calculates an
630 PID allocation wrap value. When the kernel's next PID value
640 kernel tries to allocate a number starting from this one.
779 kernel. This value defaults to SHMMAX.
858 Non-zero if the kernel has been tainted. Numeric values, which
876 512 - A kernel warning has occurred.
880 8192 - An unsigned module has been loaded in a kernel supporting module
883 32768 - The kernel has been live patched.
892 During initialization the kernel sets this value such that even if the
912 that time, kernel debugging information is displayed on console.
931 cat /proc/sys/kernel/watchdog
942 enabled in the kernel config, and cores are specified with the
949 if a kernel lockup was suspected on those cores.
955 echo 0,2-4 > /proc/sys/kernel/watchdog_cpumask