Kernel Boot Parameter Reference
The following table describes some commonly used kernel boot parameters.
|
Option |
Description |
|---|---|
|
|
Specifies the nearest For a description of system-state targets, see Systemd Targets. |
|
|
Specifies the rescue shell. The system boots to
single-user mode prompts for the |
|
|
Specifies the |
|
|
Specifies the |
|
|
Specifies emergency mode. The system boots to
single-user mode and prompts for the
|
|
|
Specifies the keyboard type, which is written to
|
|
|
Specifies the keyboard layout, which is written to
|
|
|
Specifies the system language and code set, which is
written to |
|
|
Specifies the number of loop devices
( |
|
|
Disables Ksplice Uptrack updates from being applied to the kernel. |
|
|
Reduces debugging output. |
|
|
Activates an encrypted Linux Unified Key Setup (LUKS) partition with the specified UUID. |
|
|
Specifies an LVM volume group and volume to be activated. |
|
|
Disables detection of an encrypted LUKS partition. |
|
|
Specifies to use the Red Hat graphical boot display to indicate the progress of booting. |
|
|
Disables Device-Mapper (DM) RAID detection. |
|
|
Disables Multiple Device (MD) RAID detection. |
|
|
Specifies that the root file system is to be mounted read-only, and specifies the root file system by the device path of its LVM volume (where vg is the name of the volume group). |
|
|
Specifies that the root ( |
|
|
Disables SELinux and touches the Don't disable SELinux in production environments. Rather, set SELinux to permissive mode.
|
enforcing=0
|
Sets SELinux to permissive mode until next rebooted. In permissive mode, file
contexts are automatically labeled and denials are logged, but applications can
continue to function. Use SELinux permissive mode to debug SELinux issues. |
|
|
Specifies the console font, which is written to
|
Parameters That Control System Performance
The following parameters control various aspects of system performance:
| Parameter | Description |
|---|---|
fs.file-max
|
Specifies the maximum number of open files for all processes. Increase the value of this parameter if you see messages about running out of file handles. |
kernel.io_uring_disabled
|
Specifies the disabled setting for creating You can set the following values for the
|
net.core.netdev_max_backlog
|
Specifies the size of the receiver backlog queue, which is used if an interface receives packets faster than the kernel can process them. If this queue is too small, packets are lost at the receiver, rather than on the network. |
net.core.rmem_max
|
Specifies the maximum read socket buffer size. To minimize network packet loss, this buffer must be large enough to handle incoming network packets. |
net.core.wmem_max
|
Specifies the maximum write socket buffer size. To minimize network packet loss, this buffer must be large enough to handle outgoing network packets. |
net.ipv4.tcp_available_congestion_control
|
Displays the TCP congestion avoidance algorithms that are
available for use. Use the modprobe
command if you need to load additional modules such as
|
net.ipv4.tcp_congestion_control
|
Specifies which TCP congestion avoidance algorithm is used. |
net.ipv4.tcp_max_syn_backlog
|
Specifies the number of outstanding |
net.ipv4.tcp_rmem
|
Specifies minimum, default, and maximum receive buffer sizes that are used for a TCP
socket. The maximum value can't be larger than |
net.ipv4.tcp_wmem
|
Specifies minimum, default, and maximum send buffer sizes that are used for a TCP
socket. The maximum value can't be larger than |
vm.swappiness
|
Specifies how likely the kernel is to write loaded pages to swap rather than drop pages from the system page cache. When set to 0, swapping only occurs to avoid an out of memory condition. When set to 100, the kernel swaps aggressively. For a desktop system, setting a lower value can improve system responsiveness by decreasing latency. The default value is 60. This parameter is intended for use with laptop computers to reduce power consumption by the hard disk. Don't adjust this value on server systems. |
Parameters That Control Kernel Panics
The following parameters control the circumstances under which a kernel panic can occur.
| Parameter | Description |
|---|---|
kernel.hung_task_panic
|
If set to 1, the kernel panics if any kernel or user thread sleeps in the
The default value is 0, which disables the panic.
To diagnose a hung thread, you can examine
|
kernel.hung_task_timeout_secs
|
Specifies how long a user or kernel thread can remain in D
state before a warning message is generated or the kernel
panics, if the value of
|
kernel.nmi_watchdog
|
If set to 1 (default), enables the nonmaskable interrupt (NMI) watchdog thread in the
kernel. To use the NMI switch or the OProfile system profiler to generate an undefined
NMI, set the value of |
kernel.panic
|
Specifies the number of seconds after a panic before a system automatically resets itself. If the value is 0, which is the default value, the system becomes suspended, and you can collect detailed information about the panic for troubleshooting. To enable automatic reset, set a nonzero value. If you require a memory image
( |
kernel.panic_on_io_nmi
|
If set to 0 (default), the system tries to continue operations if the kernel detects an I/O channel check (IOCHK) NMI that typically indicates a uncorrectable hardware error. If set to 1, the system panics. |
kernel.panic_on_oops
|
If set to 0, the system tries to continue operations if the kernel detects an
In an OCFS2 cluster. set the value to 1 to specify that a system must panic if a kernel oops occurs. If a kernel thread required for cluster operation fails, the system must reset itself. Otherwise, another node might not detect whether a node is slow to respond or unable to respond, causing cluster operations to halt. |
kernel.panic_on_unrecovered_nmi
|
If set to 0 (default), the system tries to continue operations if the kernel detects an NMI that might indicate an uncorrectable parity or ECC memory error. If set to 1, the system panics. |
kernel.softlockup_panic
|
If set to 0 (default), the system tries to continue operations if the kernel detects a
soft-lockup error that causes the NMI watchdog thread to fail to update its
timestamp for more than twice the value of |
kernel.unknown_nmi_panic
|
If set to |
kernel.watchdog_thresh
|
Specifies the interval between generating an NMI
performance monitoring interrupt that the kernel uses to
check for hard-lockup and
soft-lockup errors. A hard-lockup
error is assumed if a CPU is unresponsive to the interrupt
for more than |
vm.panic_on_oom
|
If set to 0 (default), the kernel’s OOM-killer scans through the entire task list and stops a memory-hogging process to avoid a panic. If set to 1, the kernel panics but can survive under certain conditions. If a process limits allocations to certain nodes by using memory policies or cpusets, and those nodes reach memory exhaustion status, the OOM-killer can stop one process. No panic occurs in this case because other nodes’ memory might be free and the system as a whole might not yet be out of memory. If set to 2, the kernel always panics when an OOM condition occurs. Settings of 1 and 2 are for intended for use with clusters, depending on the defined failover policy. |