| /kernel/linux/linux-6.6/Documentation/admin-guide/ |
| D | kernel-parameters.rst | 3 The kernel's command-line parameters 12 The kernel parses parameters from the kernel command line up to "``--``"; 16 Everything after "``--``" is passed as an argument to init. 32 log_buf_len=1M print-fatal-signals=1 36 log-buf-len=1M print_fatal_signals=1 38 Double-quotes can be used to protect spaces in values, e.g.:: 43 ---------- 52 <cpu number>-<cpu number> 57 <cpu number>,...,<cpu number>-<cpu number> 63 <cpu number>-<cpu number>:<used size>/<group size> [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | kernel-parameters.rst | 3 The kernel's command-line parameters 12 The kernel parses parameters from the kernel command line up to "``--``"; 16 Everything after "``--``" is passed as an argument to init. 32 log_buf_len=1M print-fatal-signals=1 36 log-buf-len=1M print_fatal_signals=1 38 Double-quotes can be used to protect spaces in values, e.g.:: 43 ---------- 52 <cpu number>-<cpu number> 57 <cpu number>,...,<cpu number>-<cpu number> 63 <cpu number>-cpu number>:<used size>/<group size> [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/kernel/ |
| D | secure_boot.c | 1 // SPDX-License-Identifier: GPL-2.0 14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node() 15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node() 25 bool enabled = false; in is_ppc_secureboot_enabled() local 29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled() 32 if (enabled) in is_ppc_secureboot_enabled() 35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled() 36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled() 39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled() 41 return enabled; in is_ppc_secureboot_enabled() [all …]
|
| D | ima_arch.c | 1 // SPDX-License-Identifier: GPL-2.0 16 * The "secure_rules" are enabled only on "secureboot" enabled systems. 23 * is not enabled. 34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems. 45 * The "secure_and_trusted_rules" contains rules for both the secure boot and 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig", 60 * Returns the relevant IMA arch-specific policies based on the system secure 61 * boot state.
|
| /kernel/linux/linux-5.10/arch/powerpc/kernel/ |
| D | secure_boot.c | 1 // SPDX-License-Identifier: GPL-2.0 14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node() 15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node() 25 bool enabled = false; in is_ppc_secureboot_enabled() local 29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled() 32 if (enabled) in is_ppc_secureboot_enabled() 35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled() 36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled() 39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled() 41 return enabled; in is_ppc_secureboot_enabled() [all …]
|
| D | ima_arch.c | 1 // SPDX-License-Identifier: GPL-2.0 16 * The "secure_rules" are enabled only on "secureboot" enabled systems. 23 * is not enabled. 34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems. 45 * The "secure_and_trusted_rules" contains rules for both the secure boot and 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig", 60 * Returns the relevant IMA arch-specific policies based on the system secure 61 * boot state.
|
| /kernel/linux/linux-6.6/drivers/firmware/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 # see Documentation/kbuild/kconfig-language.rst. 19 provides a mechanism for inter-processor communication between SCP 38 enabled or disabled via the SCP firmware 49 tristate "BIOS Enhanced Disk Drive calls determine boot disk" 54 BIOS tries boot from. This information is then exported via sysfs. 56 This option is experimental and is known to fail to boot on some 66 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set 70 bool "Add firmware-provided memory map to sysfs" if EXPERT 73 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap. [all …]
|
| /kernel/linux/linux-6.6/mm/ |
| D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 24 use-after-free). The error reports for these checks can be augmented 26 PAGE_OWNER is also selected and enabled on boot. 31 be enabled in combination with hibernation as that would result in 38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc 54 memory. This can make kmalloc/kfree-intensive workloads much slower. 64 will still exist (with SYSFS enabled), it will not provide e.g. cache 73 Boot with debugging on by default. SLUB boots by default with 75 equivalent to specifying the "slub_debug" parameter on boot. 79 "slub_debug=-". [all …]
|
| /kernel/linux/linux-5.10/drivers/firmware/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 # see Documentation/kbuild/kconfig-language.rst. 15 set of operating system-independent software interfaces that are 17 interfaces for: Discovery and self-description of the interfaces 19 a given device or domain into the various power-saving states that 37 enabled or disabled via the SCP firmware 40 will be called scmi_pm_domain. Note this may needed early in boot 51 provides a mechanism for inter-processor communication between SCP 70 enabled or disabled via the SCP firmware 82 tristate "BIOS Enhanced Disk Drive calls determine boot disk" [all …]
|
| /kernel/linux/linux-6.6/drivers/accel/habanalabs/include/common/ |
| D | hl_boot_if.h | 1 /* SPDX-License-Identifier: GPL-2.0 3 * Copyright 2018-2020 HabanaLabs, Ltd. 11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */ 47 * will clear the non-relevant ones. 68 * Boot continues as usual, but keep in 90 * started, but is not ready yet - chip 95 * trust), boot authentication (chain of 138 * memories. Boot disabled until reset. 140 * CPU_BOOT_ERR0_ENABLED Error registers enabled. 203 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers [all …]
|
| /kernel/linux/linux-6.6/Documentation/arch/x86/ |
| D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 memory. Private memory is encrypted with the guest-specific key, while shared 20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor 36 When SEV is enabled, instruction pages and guest page tables are always treated 39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware 52 memory encryption is enabled (this only affects 57 determine if SME is enabled and/or to enable memory encryption:: 61 1 = memory encryption features are enabled 78 - Supported: 81 - Enabled: [all …]
|
| /kernel/linux/linux-6.6/arch/arm/mach-mvebu/ |
| D | coherency_ll.S | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 7 * Gregory CLEMENT <gregory.clement@free-electrons.com> 11 * CPUs during their early boot in an SMP kernel, this why this 13 * primary CPU from C code during its boot. 23 .arch armv7-a 27 * the coherency fabric is not enabled. 31 tst r1, #CR_M @ Check MMU bit enabled 44 * MMU is enabled, use the virtual address of the coherency 57 * endian-swapped as appropriate so that the calling functions do not 85 * CPU boot, and no stack is available at this point. [all …]
|
| /kernel/linux/linux-6.6/arch/arm64/include/asm/ |
| D | cpufeature.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 9 #include <asm/alternative-macros.h> 32 * between the values, the features are classified into 3 types - LOWER_SAFE, 78 * A @mask field set to full-1 indicates that the corresponding field 81 * A @mask field set to full-0 with the corresponding @val field set 82 * to full-0 denotes that this field has no override 84 * A @mask field set to full-0 with the corresponding @val field set 85 * to full-1 denotes thath this field has an invalid override. 93 * @arm64_ftr_reg - Feature register 142 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/include/asm/ |
| D | cpufeature.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 28 * between the values, the features are classified into 3 types - LOWER_SAFE, 67 * @arm64_ftr_reg - Feature register 115 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the 125 * actions if any. Usually, this is done, after all the boot-time 126 * enabled CPUs are brought up by the kernel, so that it can make 129 * boot by the primary boot CPU. (e.g, running the kernel at EL2 with 135 * CPUs are treated "late CPUs" for capabilities determined by the boot 139 * a) Boot CPU scope capabilities - Finalised by primary boot CPU via 141 * b) Everything except (a) - Run via setup_system_capabilities(). [all …]
|
| /kernel/linux/linux-5.10/arch/arm/mach-mvebu/ |
| D | coherency_ll.S | 6 * Gregory CLEMENT <gregory.clement@free-electrons.com> 14 * CPUs during their early boot in an SMP kernel, this why this 16 * primary CPU from C code during its boot. 29 * the coherency fabric is not enabled. 33 tst r1, #CR_M @ Check MMU bit enabled 44 * MMU is enabled, use the virtual address of the coherency 57 * endian-swapped as appropriate so that the calling functions do not 85 * CPU boot, and no stack is available at this point. 89 /* Bail out if the coherency is not enabled */ 110 * CPU boot, and no stack is available at this point. [all …]
|
| /kernel/linux/linux-5.10/scripts/package/ |
| D | mkspec | 9 # Patched for non-x86 by Opencon (L) 2002 <opencon@rio.skydome.net> 15 MAKE="$MAKE -f $srctree/Makefile" 20 if grep -q CONFIG_MODULES=y .config; then 26 if grep -q CONFIG_DRM=y .config; then 27 PROVIDES=kernel-drm 30 PROVIDES="$PROVIDES kernel-$KERNELRELEASE" 31 __KERNELRELEASE=$(echo $KERNELRELEASE | sed -e "s/-/_/g") 32 EXCLUDES="$RCS_TAR_IGNORE --exclude=*vmlinux* --exclude=*.mod \ 33 --exclude=*.o --exclude=*.ko --exclude=*.cmd --exclude=Documentation \ 34 --exclude=.config.old --exclude=.missing-syscalls.d --exclude=*.s" [all …]
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | sysfs-firmware-acpi | 6 information for firmware performance data for system boot, 10 boot: 14 loading the OS boot loader into memory. 17 launching the currently loaded OS boot loader 36 since the last full boot sequence. 38 logged since the last full boot sequence, 49 to obtain a copy of the firmware boot splash and 51 by boot splash applications in order to interact with 52 the firmware boot splash in order to avoid jarring 55 image: The image bitmap. Currently a 32-bit BMP. [all …]
|
| /kernel/linux/linux-5.10/mm/ |
| D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 24 use-after-free). The error reports for these checks can be augmented 26 PAGE_OWNER is also selected and enabled on boot. 31 be enabled in combination with hibernation as that would result in 38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc 59 "page_owner=on" to boot parameter in order to enable it. Eats 60 a fair amount of memory if enabled. See tools/vm/page_owner_sort.c 61 for user-space helper. 72 have a potential performance impact if enabled with the 73 "page_poison=1" kernel boot option. [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/kexec/ |
| D | kexec_common_lib.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 VERBOSE="${VERBOSE:-1}" 7 IKCONFIG="/tmp/config-`uname -r`" 8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`" 13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1" 19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]" 26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]" 33 [ $VERBOSE -ne 0 ] && echo "$1" 37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID). 38 # (Based on kdump-lib.sh) [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kexec/ |
| D | kexec_common_lib.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 VERBOSE="${VERBOSE:-1}" 7 IKCONFIG="/tmp/config-`uname -r`" 8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`" 13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1" 19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]" 26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]" 33 [ $VERBOSE -ne 0 ] && echo "$1" 37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID). 38 # (Based on kdump-lib.sh) [all …]
|
| /kernel/linux/linux-6.6/Documentation/powerpc/ |
| D | firmware-assisted-dump.rst | 2 Firmware-Assisted Dump 7 The goal of firmware-assisted dump is to enable the dump of 8 a crashed system, and to do so from a fully-reset system, and 12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace 14 - Fadump uses the same firmware interfaces and memory reservation model 16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore 19 - Unlike phyp dump, userspace tool does not need to refer any sysfs 21 - Unlike phyp dump, FADump allows user to release all the memory reserved 23 - Once enabled through kernel boot parameter, FADump can be 28 Comparing with kdump or other strategies, firmware-assisted [all …]
|
| /kernel/linux/linux-5.10/Documentation/powerpc/ |
| D | firmware-assisted-dump.rst | 2 Firmware-Assisted Dump 7 The goal of firmware-assisted dump is to enable the dump of 8 a crashed system, and to do so from a fully-reset system, and 12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace 14 - Fadump uses the same firmware interfaces and memory reservation model 16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore 19 - Unlike phyp dump, userspace tool does not need to refer any sysfs 21 - Unlike phyp dump, FADump allows user to release all the memory reserved 23 - Once enabled through kernel boot parameter, FADump can be 28 Comparing with kdump or other strategies, firmware-assisted [all …]
|
| /kernel/linux/linux-5.10/drivers/platform/mellanox/ |
| D | mlxbf-bootctl.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 10 * Request that the on-chip watchdog be enabled, or disabled, after 12 * status of the on-chip watchdog. If non-zero, the argument 14 * will not be enabled after the next soft reset. Non-zero errors are 20 * Query the status which has been requested for the on-chip watchdog 27 * Request that a specific boot action be taken at the next soft 28 * reset. By default, the boot action is set by external chip pins, 29 * which are sampled on hard reset. Note that the boot action 33 * values. Non-zero errors are returned as documented below. 38 * Return the specific boot action which will be taken at the next [all …]
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | netconsole.rst | 1 .. SPDX-License-Identifier: GPL-2.0 27 It can be used either built-in or as a module. As a built-in, 30 capture of early kernel panics, it does capture most of the boot 39 netconsole=[+][r][src-port]@[src-ip]/[<dev>],[tgt-port]@<tgt-ip>/[tgt-macaddr] 44 src-port source for UDP packets (defaults to 6665) 45 src-ip source IP to use (interface address) 47 tgt-port port for logging agent (6666) 48 tgt-ip IP address for logging agent 49 tgt-macaddr ethernet MAC address for logging agent (broadcast) 69 Built-in netconsole starts immediately after the TCP stack is [all …]
|
| /kernel/linux/linux-6.6/drivers/platform/mellanox/ |
| D | mlxbf-bootctl.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 10 * Request that the on-chip watchdog be enabled, or disabled, after 12 * status of the on-chip watchdog. If non-zero, the argument 14 * will not be enabled after the next soft reset. Non-zero errors are 20 * Query the status which has been requested for the on-chip watchdog 27 * Request that a specific boot action be taken at the next soft 28 * reset. By default, the boot action is set by external chip pins, 29 * which are sampled on hard reset. Note that the boot action 33 * values. Non-zero errors are returned as documented below. 38 * Return the specific boot action which will be taken at the next [all …]
|