Home
last modified time | relevance | path

Searched +full:boot +full:- +full:enabled (Results 1 – 25 of 1038) sorted by relevance

12345678910>>...42

/kernel/linux/linux-6.6/Documentation/admin-guide/
Dkernel-parameters.rst3 The kernel's command-line parameters
12 The kernel parses parameters from the kernel command line up to "``--``";
16 Everything after "``--``" is passed as an argument to init.
32 log_buf_len=1M print-fatal-signals=1
36 log-buf-len=1M print_fatal_signals=1
38 Double-quotes can be used to protect spaces in values, e.g.::
43 ----------
52 <cpu number>-<cpu number>
57 <cpu number>,...,<cpu number>-<cpu number>
63 <cpu number>-<cpu number>:<used size>/<group size>
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dkernel-parameters.rst3 The kernel's command-line parameters
12 The kernel parses parameters from the kernel command line up to "``--``";
16 Everything after "``--``" is passed as an argument to init.
32 log_buf_len=1M print-fatal-signals=1
36 log-buf-len=1M print_fatal_signals=1
38 Double-quotes can be used to protect spaces in values, e.g.::
43 ----------
52 <cpu number>-<cpu number>
57 <cpu number>,...,<cpu number>-<cpu number>
63 <cpu number>-cpu number>:<used size>/<group size>
[all …]
/kernel/linux/linux-6.6/arch/powerpc/kernel/
Dsecure_boot.c1 // SPDX-License-Identifier: GPL-2.0
14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node()
15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node()
25 bool enabled = false; in is_ppc_secureboot_enabled() local
29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled()
32 if (enabled) in is_ppc_secureboot_enabled()
35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled()
36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled()
39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled()
41 return enabled; in is_ppc_secureboot_enabled()
[all …]
Dima_arch.c1 // SPDX-License-Identifier: GPL-2.0
16 * The "secure_rules" are enabled only on "secureboot" enabled systems.
23 * is not enabled.
34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems.
45 * The "secure_and_trusted_rules" contains rules for both the secure boot and
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
60 * Returns the relevant IMA arch-specific policies based on the system secure
61 * boot state.
/kernel/linux/linux-5.10/arch/powerpc/kernel/
Dsecure_boot.c1 // SPDX-License-Identifier: GPL-2.0
14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node()
15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node()
25 bool enabled = false; in is_ppc_secureboot_enabled() local
29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled()
32 if (enabled) in is_ppc_secureboot_enabled()
35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled()
36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled()
39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled()
41 return enabled; in is_ppc_secureboot_enabled()
[all …]
Dima_arch.c1 // SPDX-License-Identifier: GPL-2.0
16 * The "secure_rules" are enabled only on "secureboot" enabled systems.
23 * is not enabled.
34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems.
45 * The "secure_and_trusted_rules" contains rules for both the secure boot and
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
60 * Returns the relevant IMA arch-specific policies based on the system secure
61 * boot state.
/kernel/linux/linux-6.6/drivers/firmware/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 # see Documentation/kbuild/kconfig-language.rst.
19 provides a mechanism for inter-processor communication between SCP
38 enabled or disabled via the SCP firmware
49 tristate "BIOS Enhanced Disk Drive calls determine boot disk"
54 BIOS tries boot from. This information is then exported via sysfs.
56 This option is experimental and is known to fail to boot on some
66 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set
70 bool "Add firmware-provided memory map to sysfs" if EXPERT
73 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap.
[all …]
/kernel/linux/linux-6.6/mm/
DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
54 memory. This can make kmalloc/kfree-intensive workloads much slower.
64 will still exist (with SYSFS enabled), it will not provide e.g. cache
73 Boot with debugging on by default. SLUB boots by default with
75 equivalent to specifying the "slub_debug" parameter on boot.
79 "slub_debug=-".
[all …]
/kernel/linux/linux-5.10/drivers/firmware/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 # see Documentation/kbuild/kconfig-language.rst.
15 set of operating system-independent software interfaces that are
17 interfaces for: Discovery and self-description of the interfaces
19 a given device or domain into the various power-saving states that
37 enabled or disabled via the SCP firmware
40 will be called scmi_pm_domain. Note this may needed early in boot
51 provides a mechanism for inter-processor communication between SCP
70 enabled or disabled via the SCP firmware
82 tristate "BIOS Enhanced Disk Drive calls determine boot disk"
[all …]
/kernel/linux/linux-6.6/drivers/accel/habanalabs/include/common/
Dhl_boot_if.h1 /* SPDX-License-Identifier: GPL-2.0
3 * Copyright 2018-2020 HabanaLabs, Ltd.
11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */
47 * will clear the non-relevant ones.
68 * Boot continues as usual, but keep in
90 * started, but is not ready yet - chip
95 * trust), boot authentication (chain of
138 * memories. Boot disabled until reset.
140 * CPU_BOOT_ERR0_ENABLED Error registers enabled.
203 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers
[all …]
/kernel/linux/linux-6.6/Documentation/arch/x86/
Damd-memory-encryption.rst1 .. SPDX-License-Identifier: GPL-2.0
19 memory. Private memory is encrypted with the guest-specific key, while shared
20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor
36 When SEV is enabled, instruction pages and guest page tables are always treated
39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware
52 memory encryption is enabled (this only affects
57 determine if SME is enabled and/or to enable memory encryption::
61 1 = memory encryption features are enabled
78 - Supported:
81 - Enabled:
[all …]
/kernel/linux/linux-6.6/arch/arm/mach-mvebu/
Dcoherency_ll.S1 /* SPDX-License-Identifier: GPL-2.0-only */
7 * Gregory CLEMENT <gregory.clement@free-electrons.com>
11 * CPUs during their early boot in an SMP kernel, this why this
13 * primary CPU from C code during its boot.
23 .arch armv7-a
27 * the coherency fabric is not enabled.
31 tst r1, #CR_M @ Check MMU bit enabled
44 * MMU is enabled, use the virtual address of the coherency
57 * endian-swapped as appropriate so that the calling functions do not
85 * CPU boot, and no stack is available at this point.
[all …]
/kernel/linux/linux-6.6/arch/arm64/include/asm/
Dcpufeature.h1 /* SPDX-License-Identifier: GPL-2.0-only */
9 #include <asm/alternative-macros.h>
32 * between the values, the features are classified into 3 types - LOWER_SAFE,
78 * A @mask field set to full-1 indicates that the corresponding field
81 * A @mask field set to full-0 with the corresponding @val field set
82 * to full-0 denotes that this field has no override
84 * A @mask field set to full-0 with the corresponding @val field set
85 * to full-1 denotes thath this field has an invalid override.
93 * @arm64_ftr_reg - Feature register
142 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the
[all …]
/kernel/linux/linux-5.10/arch/arm64/include/asm/
Dcpufeature.h1 /* SPDX-License-Identifier: GPL-2.0-only */
28 * between the values, the features are classified into 3 types - LOWER_SAFE,
67 * @arm64_ftr_reg - Feature register
115 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the
125 * actions if any. Usually, this is done, after all the boot-time
126 * enabled CPUs are brought up by the kernel, so that it can make
129 * boot by the primary boot CPU. (e.g, running the kernel at EL2 with
135 * CPUs are treated "late CPUs" for capabilities determined by the boot
139 * a) Boot CPU scope capabilities - Finalised by primary boot CPU via
141 * b) Everything except (a) - Run via setup_system_capabilities().
[all …]
/kernel/linux/linux-5.10/arch/arm/mach-mvebu/
Dcoherency_ll.S6 * Gregory CLEMENT <gregory.clement@free-electrons.com>
14 * CPUs during their early boot in an SMP kernel, this why this
16 * primary CPU from C code during its boot.
29 * the coherency fabric is not enabled.
33 tst r1, #CR_M @ Check MMU bit enabled
44 * MMU is enabled, use the virtual address of the coherency
57 * endian-swapped as appropriate so that the calling functions do not
85 * CPU boot, and no stack is available at this point.
89 /* Bail out if the coherency is not enabled */
110 * CPU boot, and no stack is available at this point.
[all …]
/kernel/linux/linux-5.10/scripts/package/
Dmkspec9 # Patched for non-x86 by Opencon (L) 2002 <opencon@rio.skydome.net>
15 MAKE="$MAKE -f $srctree/Makefile"
20 if grep -q CONFIG_MODULES=y .config; then
26 if grep -q CONFIG_DRM=y .config; then
27 PROVIDES=kernel-drm
30 PROVIDES="$PROVIDES kernel-$KERNELRELEASE"
31 __KERNELRELEASE=$(echo $KERNELRELEASE | sed -e "s/-/_/g")
32 EXCLUDES="$RCS_TAR_IGNORE --exclude=*vmlinux* --exclude=*.mod \
33 --exclude=*.o --exclude=*.ko --exclude=*.cmd --exclude=Documentation \
34 --exclude=.config.old --exclude=.missing-syscalls.d --exclude=*.s"
[all …]
/kernel/linux/linux-6.6/Documentation/ABI/testing/
Dsysfs-firmware-acpi6 information for firmware performance data for system boot,
10 boot:
14 loading the OS boot loader into memory.
17 launching the currently loaded OS boot loader
36 since the last full boot sequence.
38 logged since the last full boot sequence,
49 to obtain a copy of the firmware boot splash and
51 by boot splash applications in order to interact with
52 the firmware boot splash in order to avoid jarring
55 image: The image bitmap. Currently a 32-bit BMP.
[all …]
/kernel/linux/linux-5.10/mm/
DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
59 "page_owner=on" to boot parameter in order to enable it. Eats
60 a fair amount of memory if enabled. See tools/vm/page_owner_sort.c
61 for user-space helper.
72 have a potential performance impact if enabled with the
73 "page_poison=1" kernel boot option.
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/
Dkexec_common_lib.sh2 # SPDX-License-Identifier: GPL-2.0
6 VERBOSE="${VERBOSE:-1}"
7 IKCONFIG="/tmp/config-`uname -r`"
8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`"
13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1"
19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]"
26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]"
33 [ $VERBOSE -ne 0 ] && echo "$1"
37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID).
38 # (Based on kdump-lib.sh)
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/kexec/
Dkexec_common_lib.sh2 # SPDX-License-Identifier: GPL-2.0
6 VERBOSE="${VERBOSE:-1}"
7 IKCONFIG="/tmp/config-`uname -r`"
8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`"
13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1"
19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]"
26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]"
33 [ $VERBOSE -ne 0 ] && echo "$1"
37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID).
38 # (Based on kdump-lib.sh)
[all …]
/kernel/linux/linux-6.6/Documentation/powerpc/
Dfirmware-assisted-dump.rst2 Firmware-Assisted Dump
7 The goal of firmware-assisted dump is to enable the dump of
8 a crashed system, and to do so from a fully-reset system, and
12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace
14 - Fadump uses the same firmware interfaces and memory reservation model
16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore
19 - Unlike phyp dump, userspace tool does not need to refer any sysfs
21 - Unlike phyp dump, FADump allows user to release all the memory reserved
23 - Once enabled through kernel boot parameter, FADump can be
28 Comparing with kdump or other strategies, firmware-assisted
[all …]
/kernel/linux/linux-5.10/Documentation/powerpc/
Dfirmware-assisted-dump.rst2 Firmware-Assisted Dump
7 The goal of firmware-assisted dump is to enable the dump of
8 a crashed system, and to do so from a fully-reset system, and
12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace
14 - Fadump uses the same firmware interfaces and memory reservation model
16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore
19 - Unlike phyp dump, userspace tool does not need to refer any sysfs
21 - Unlike phyp dump, FADump allows user to release all the memory reserved
23 - Once enabled through kernel boot parameter, FADump can be
28 Comparing with kdump or other strategies, firmware-assisted
[all …]
/kernel/linux/linux-5.10/drivers/platform/mellanox/
Dmlxbf-bootctl.h1 /* SPDX-License-Identifier: GPL-2.0 */
10 * Request that the on-chip watchdog be enabled, or disabled, after
12 * status of the on-chip watchdog. If non-zero, the argument
14 * will not be enabled after the next soft reset. Non-zero errors are
20 * Query the status which has been requested for the on-chip watchdog
27 * Request that a specific boot action be taken at the next soft
28 * reset. By default, the boot action is set by external chip pins,
29 * which are sampled on hard reset. Note that the boot action
33 * values. Non-zero errors are returned as documented below.
38 * Return the specific boot action which will be taken at the next
[all …]
/kernel/linux/linux-6.6/Documentation/networking/
Dnetconsole.rst1 .. SPDX-License-Identifier: GPL-2.0
27 It can be used either built-in or as a module. As a built-in,
30 capture of early kernel panics, it does capture most of the boot
39 netconsole=[+][r][src-port]@[src-ip]/[<dev>],[tgt-port]@<tgt-ip>/[tgt-macaddr]
44 src-port source for UDP packets (defaults to 6665)
45 src-ip source IP to use (interface address)
47 tgt-port port for logging agent (6666)
48 tgt-ip IP address for logging agent
49 tgt-macaddr ethernet MAC address for logging agent (broadcast)
69 Built-in netconsole starts immediately after the TCP stack is
[all …]
/kernel/linux/linux-6.6/drivers/platform/mellanox/
Dmlxbf-bootctl.h1 /* SPDX-License-Identifier: GPL-2.0 */
10 * Request that the on-chip watchdog be enabled, or disabled, after
12 * status of the on-chip watchdog. If non-zero, the argument
14 * will not be enabled after the next soft reset. Non-zero errors are
20 * Query the status which has been requested for the on-chip watchdog
27 * Request that a specific boot action be taken at the next soft
28 * reset. By default, the boot action is set by external chip pins,
29 * which are sampled on hard reset. Note that the boot action
33 * values. Non-zero errors are returned as documented below.
38 * Return the specific boot action which will be taken at the next
[all …]

12345678910>>...42