From nobody Sun Apr 5 18:20:21 2026 Received: from mail-pl1-f196.google.com (mail-pl1-f196.google.com [209.85.214.196]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7225130EF7D for ; Mon, 23 Feb 2026 17:03:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.196 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771866195; cv=none; b=fiSFVBSFuZ+7BK/3DlpeMbCQdeGl1fZwocu/2WVLQYgk3hK6VxUb86M//uLJ/ZKijsD/92ZjCePXpEigL4AbB4gUbHWjc4WZW7TmAtJnfcpZoOyiWyANkZltwuPyo+HbLkK9QFz840KMYQ2NfXBwDkUVgKYn7IgdwE6dbS7GMRc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771866195; c=relaxed/simple; bh=01dgStLxMS9aTnMI8IlTDVuPmoGpFNt9rtBjsvybJOY=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=GPPOsiVyJOYGKJj5MkqmggudW40i9cjDsgjirANBtJ1Eo7zloAG+5L81K35hGlwEC9eZhSGiLz+9lwFuHubLEDaw8d5bkmYrKc9L80rJ4KTBpZI5HuzAInevz7MSbnPUWDz7J1r6CUEN5r9Q0DK9U+V2dq/v+ME85cS+09hgqag= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=aMIBUtf8; arc=none smtp.client-ip=209.85.214.196 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="aMIBUtf8" Received: by mail-pl1-f196.google.com with SMTP id d9443c01a7336-2aaf9191da3so29474645ad.2 for ; Mon, 23 Feb 2026 09:03:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771866189; x=1772470989; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=Q1tnNSjdMmiZcchpYj7Fmmy7pyxIY3tVA+shYAraIB0=; b=aMIBUtf8SxX6s7ETzNsS1aZILu2xeMwf8caNtQyKHb4vEZ/8HeyfJXcy5O+kvYFGGg wtLCHGi9u82qx8JFnSLpBTLTQX8m9nE8fRc/DgYyunhIjpyRoNYTq1JUwYqQUfpU8jYS gdsLMzMywcuwm7vt17JBfR3BFMu74+6R6BWhltDsAfS6B51l9tHWzQGbUhHr0JsXlqve m536moiyuHk/VkCckMKTo+mwSXg0eDxxECC1nHkGP0K8DqomJj4pQiXswHYJJetfexz+ eGOSx0rBRZF4LDpp5apaW3uTGCUSNmcdobFJPCq3qJHf/cPETANQkOnZ8LGtGifp8O99 lbNw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771866189; x=1772470989; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=Q1tnNSjdMmiZcchpYj7Fmmy7pyxIY3tVA+shYAraIB0=; b=F99FL/hAyxECPnB5B1LzGa4MKcPEOkOG15Z5MsJgkud2T5KsSNhSJ6kmuOKkagbLMA 9Ig1G9G5lu6sleCt6UpMGy8il38xz3lqDHKoXji6yG4dC8yFdaRRDE+jPobOJMvhuTtZ 7+h7Py7xLbVaJRlIZce0brvVxAi2O3lRJXnD76wXVBTJt1hnnXVmaCSO++ctxnc06vR/ NV+aj0eVlE5guq9VXOWiqFGJydvYBhlGKuNF8iyHNSEc6Ss3l/1NKuMtE2cWXqALsVAv jEOd6fV4QS22WzNnlOSye6SUoLnCuc6+TbuZAfae3IpH6GppvgD40/eWo3XVIyIo+pwg 4r4Q== X-Forwarded-Encrypted: i=1; AJvYcCW9fIWdq1IJpQd/hLe6w7CUQtoMjRDEtlnz53Ak9RMWn8qDCnmsJsy8BZcMpYvvNogeYmBMMKv7omJADvY=@vger.kernel.org X-Gm-Message-State: AOJu0YxmbZ9gKf5v6nrjXs7A3V/zYgPzUpa6Fir3o55tILfSJnrqy7aL uWqckkd/OKe7JAbbkEnrGkAiNuuLUWxDYbEdAffMW9R3sCOLcCQNTsKnS2NE36GlMjLaQA== X-Gm-Gg: ATEYQzyK/Y397WpdSfQC2aes95I2G9slLgBlBZqnDzWwZrWu4dzLSJeow1+GPSdShMu pT/o+/xjY42J9egbUk4+oA8paxhP6BwJ7ks05z/eTq45xmLvo81w9JqpqeYhFNlSpUeGQI3ULKN 0eRCXCfrVD1P0nt1MyWQMi6BNuoxsTkuohW5IsTfK/FRToWFOR+d6VzdTU6d+P8UbRJ3X/xQvUh xjAPbmENneOIbgpsJDmKu5Mn/rFA67SyW/ls8DGyJ8h0sUiLVKooSDP05/HPCn1RxbKdlypNKRx i/zLgDjUThy+pbZmEZDz9JZGwWA2vbYk/0ssbF9eG+auA53zO4l2tmJ355boEqn00AyawErUKsi oxs1U87+rQQjfBPEE4VQXD4lWcvcKobjMFX7zKrQm/0G4zs5CmGf1806mybXTLqiPZisxrWe8FD St9w5Tat13CbGyEa9QdR2JoszptFjcWaU35T8= X-Received: by 2002:a17:903:11d2:b0:2aa:e6c8:2c6e with SMTP id d9443c01a7336-2ad7457a8c8mr78853495ad.56.1771866189336; Mon, 23 Feb 2026 09:03:09 -0800 (PST) Received: from fedora ([2409:40e5:11e3:f079:b796:44c2:7e10:cd23]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2ad74e34452sm78950655ad.7.2026.02.23.09.03.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Feb 2026 09:03:08 -0800 (PST) From: Shubham Chakraborty To: Jonathan Corbet Cc: Shuah Khan , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Shubham Chakraborty Subject: [PATCH v2] docs: sysctl: Add documentation for crypto and debug sysctls Date: Mon, 23 Feb 2026 22:32:51 +0530 Message-ID: <20260223170251.10540-1-chakrabortyshubham66@gmail.com> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The /proc/sys/crypto and /proc/sys/debug directories lacked documentation in the admin-guide. Add RST files covering fips_enabled, fips_name, fips_version, exception-trace, and kprobes-optimization sysctls. Signed-off-by: Shubham Chakraborty Tested-by: Randy Dunlap --- Documentation/admin-guide/sysctl/crypto.rst | 49 +++++++++++++++++++ Documentation/admin-guide/sysctl/debug.rst | 53 +++++++++++++++++++++ Documentation/admin-guide/sysctl/index.rst | 6 ++- 3 files changed, 106 insertions(+), 2 deletions(-) create mode 100644 Documentation/admin-guide/sysctl/crypto.rst create mode 100644 Documentation/admin-guide/sysctl/debug.rst diff --git a/Documentation/admin-guide/sysctl/crypto.rst b/Documentation/ad= min-guide/sysctl/crypto.rst new file mode 100644 index 000000000..a4c2e5ed4 --- /dev/null +++ b/Documentation/admin-guide/sysctl/crypto.rst @@ -0,0 +1,49 @@ +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +/proc/sys/crypto/ +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Currently, these files might (depending on your configuration) +show up in ``/proc/sys/crypto/``: + +.. contents:: :local: + +fips_enabled +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +This file contains a read-only flag that indicates whether FIPS mode is +enabled. + +- ``0``: FIPS mode is disabled (default). +- ``1``: FIPS mode is enabled. + +This value is set at boot time via the ``fips=3D1`` kernel command line +parameter. When enabled, the cryptographic API will restrict the use +of certain algorithms and perform self-tests to ensure compliance with +FIPS (Federal Information Processing Standards) requirements, such as +FIPS 140-2 and the newer FIPS 140-3, depending on the kernel +configuration and the module in use. + +fips_name +=3D=3D=3D=3D=3D=3D=3D=3D=3D + +This read-only file contains the name of the FIPS module currently in use. +The value is typically configured via the ``CONFIG_CRYPTO_FIPS_NAME`` +kernel configuration option. + +fips_version +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +This read-only file contains the version string of the FIPS module. +If ``CONFIG_CRYPTO_FIPS_CUSTOM_VERSION`` is set, it uses the value from +``CONFIG_CRYPTO_FIPS_VERSION``. Otherwise, it defaults to the kernel +release version (``UTS_RELEASE``). + +Copyright (c) 2026, Shubham Chakraborty + +For general info and legal blurb, please look in +Documentation/admin-guide/sysctl/index.rst. + +.. See scripts/check-sysctl-docs to keep this up to date: +.. scripts/check-sysctl-docs -vtable=3D"crypto" \ +.. Documentation/admin-guide/sysctl/crypto.rst \ +.. $(git grep -l register_sysctl_) diff --git a/Documentation/admin-guide/sysctl/debug.rst b/Documentation/adm= in-guide/sysctl/debug.rst new file mode 100644 index 000000000..a836c091d --- /dev/null +++ b/Documentation/admin-guide/sysctl/debug.rst @@ -0,0 +1,53 @@ +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +/proc/sys/debug/ +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Currently, these files might (depending on your configuration) +show up in ``/proc/sys/debug/``: + +.. contents:: :local: + +exception-trace +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +This flag controls whether the kernel prints information about unhandled +signals (like segmentation faults) to the kernel log (``dmesg``). + +- ``0``: Unhandled signals are not traced. +- ``1``: Information about unhandled signals is printed. + +The default value is ``1`` on most architectures (like x86, MIPS, RISC-V), +but it is ``0`` on **arm64**. + +The actual information printed and the context provided varies +significantly depending on the CPU architecture. For example: + +- On **x86**, it typically prints the instruction pointer (IP), error + code, and address that caused a page fault. +- On **PowerPC**, it may print the next instruction pointer (NIP), + link register (LR), and other relevant registers. + +When enabled, this feature is often rate-limited to prevent the kernel +log from being flooded during a crash loop. + +kprobes-optimization +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +This flag enables or disables the optimization of Kprobes on certain +architectures (like x86). + +- ``0``: Kprobes optimization is turned off. +- ``1``: Kprobes optimization is turned on (default). + +For more details on Kprobes and its optimization, please refer to +Documentation/trace/kprobes.rst. + +Copyright (c) 2026, Shubham Chakraborty + +For general info and legal blurb, please look in +Documentation/admin-guide/sysctl/index.rst. + +.. See scripts/check-sysctl-docs to keep this up to date: +.. scripts/check-sysctl-docs -vtable=3D"debug" \ +.. Documentation/admin-guide/sysctl/debug.rst \ +.. $(git grep -l register_sysctl_) diff --git a/Documentation/admin-guide/sysctl/index.rst b/Documentation/adm= in-guide/sysctl/index.rst index 4dd2c9b5d..e153c9611 100644 --- a/Documentation/admin-guide/sysctl/index.rst +++ b/Documentation/admin-guide/sysctl/index.rst @@ -67,8 +67,8 @@ This documentation is about: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D abi/ execution domains & personalities <$ARCH> tuning controls for various CPU architecture (e.g. csky, s390) -crypto/ -debug/ +crypto/ cryptographic subsystem +debug/ debugging features dev/ device specific information (e.g. dev/cdrom/info) fs/ specific filesystems filehandle, inode, dentry and quota tuning @@ -96,6 +96,8 @@ it :-) :maxdepth: 1 =20 abi + crypto + debug fs kernel net --=20 2.53.0