Lines Matching +full:button +full:- +full:uid

5 .. See scripts/check-sysctl-docs to keep this up to date
13 Documentation/admin-guide/sysctl/index.rst.
15 ------------------------------------------------------------------------------
39 If BSD-style process accounting is enabled these values control
71 The machine hardware name, the same output as ``uname -m``
129 Ctrl-Alt-Delete). Writing a value to this file which doesn't
130 correspond to a running process will result in ``-ESRCH``.
132 See also `ctrl-alt-del`_.
168 %u uid (in initial user namespace)
225 ctrl-alt-del
228 When the value in this file is 0, ctrl-alt-del is trapped and
236 mode, the ctrl-alt-del is intercepted by the program before it
281 See Documentation/driver-api/firmware/fallback-mechanisms.rst.
335 debug information. If enabled, arch-specific all-CPU stack dumping
355 See Documentation/admin-guide/lockup-watchdogs.rst for more information.
367 modern systems rely exclusively on the netlink-based uevent source and
381 1: Will non-maskably interrupt all CPUs and dump their backtraces when
438 -1: report an infinite number of warnings.
444 Controls whether the panic kmsg data should be reported to Hyper-V.
452 ignore-unaligned-usertrap
466 See also `unaligned-trap`_.
478 -EPERM) for unprivileged processes not in the io_uring_group group.
482 always fails with -EPERM. Existing io_uring instances can still be
492 to create an io_uring instance. If io_uring_group is set to -1 (the
520 -1 Unlimited calls to kexec. This is the default setting.
549 The correct long-term solution is to do the permission checks at
625 By default they are equal to -1, which means generic allocation logic.
631 2) Toggle with non-default value will be set back to -1 by kernel after
633 fails, it is undefined if the value remains unmodified or is reset to -1.
657 that are programmed to generate Non-Maskable Interrupts (NMIs) periodically
666 Documentation/admin-guide/kernel-parameters.rst).
717 promotion throughput. The per-node max promotion throughput in MB/s
735 1: Will non-maskably interrupt all CPUs and dump their backtraces when
765 The only way to tune these values is to rebuild the kernel :-)
771 if your architecture did not always support 32-bit UIDs (i.e. arm,
772 i386, m68k, sh, and sparc32), a fixed UID and GID will be returned to
773 applications that use the old 16-bit UID/GID system calls, if the
774 actual UID or GID would exceed 65535.
776 These sysctls allow you to change the value of the fixed UID and GID.
805 servers issue this sort of NMI when the dump button is pushed,
817 1 Panic immediately. If the `panic` sysctl is also non-zero then the
919 1-100 Attempt to throttle perf's sample rate to this
942 -1 Allow use of (almost) all events by all users.
963 '``perf record -g``' or '``perf trace --call-graph fp``'.
966 enabled, otherwise writing to this file will return ``-EBUSY``.
974 Control size of per-cpu ring buffer not counted against mlock limit.
984 instance, when using '``perf record -g``' or '``perf trace --call-graph fp``'.
987 enabled, otherwise writing to this file will return ``-EBUSY``.
1038 powersave-nap (PPC only)
1041 If set, Linux-PPC will use the 'nap' mode of powersaving,
1074 Value from 0 - 10000 is allowed.
1110 a one-time setting until next reboot: once set, it cannot be changed by
1162 loaded to random addresses. Also for PIE-linked binaries, the
1173 non-legacy applications that would be broken this way, so for most
1182 real-root-dev
1185 See Documentation/admin-guide/initrd.rst.
1188 reboot-cmd (SPARC only)
1204 this value to 0. On Non-EAS platforms, write operation fails and
1211 Documentation/accounting/delay-accounting.rst. Enabling this feature incurs
1280 See Documentation/userspace-api/seccomp_filter.rst.
1283 sg-big-buff
1358 -1 Legacy per-write sysctl value handling, with no printk warnings.
1424 On x86, each "split lock" imposes a system-wide performance penalty. On larger
1426 denials of service to well-behaved and potentially more important users.
1437 0 Disable the mitigation mode - just warns the split lock on kernel log
1439 1 Enable the mitigation mode (this is the default) - penalizes the split
1462 stop-a (SPARC only)
1465 Controls Stop-A:
1468 0 Stop-A has no effect.
1469 1 Stop-A breaks to the PROM (default).
1472 Stop-A is always enabled on a panic, so that the user can return to
1479 See Documentation/admin-guide/sysrq.rst.
1485 Non-zero if the kernel has been tainted. Numeric values, which can be
1501 4096 `(O)` externally-built ("out-of-tree") module was loaded
1509 See Documentation/admin-guide/tainted-kernels.rst for more information.
1516 See Documentation/admin-guide/kernel-parameters.rst for more details on
1520 threads-max
1530 The minimum value that can be written to ``threads-max`` is 1.
1532 The maximum value that can be written to ``threads-max`` is given by the
1535 If a value outside of this range is written to ``threads-max`` an
1562 See Documentation/admin-guide/kernel-parameters.rst and
1563 Documentation/trace/boottime-trace.rst.
1566 unaligned-trap
1579 See also `ignore-unaligned-usertrap`_.
1586 value is non-zero, unknown NMI is trapped and then panic occurs. At
1598 will return ``-EPERM``. Once set to 1, this can't be cleared from the
1657 to re-enable cores that by default were not running the watchdog,
1664 echo 0,2-4 > /proc/sys/kernel/watchdog_cpumask