/linux-6.12.1/Documentation/admin-guide/ |
D | kernel-parameters.rst | 3 The kernel's command-line parameters 12 The kernel parses parameters from the kernel command line up to "``--``"; 16 Everything after "``--``" is passed as an argument to init. 32 log_buf_len=1M print-fatal-signals=1 36 log-buf-len=1M print_fatal_signals=1 38 Double-quotes can be used to protect spaces in values, e.g.:: 43 ---------- 52 <cpu number>-<cpu number> 57 <cpu number>,...,<cpu number>-<cpu number> 63 <cpu number>-<cpu number>:<used size>/<group size> [all …]
|
D | kernel-parameters.txt | 5 avoid prolonged boot times. The lazy option will add 10 at once during boot. 16 force -- enable ACPI if default was off 17 on -- enable ACPI but allow fallback to DT [arm64,riscv64] 18 off -- disable ACPI if default was on 19 noirq -- do not use ACPI for IRQ routing 20 strict -- Be less tolerant of platforms that are not 22 rsdt -- prefer RSDT over (default) XSDT 23 copy_dsdt -- copy DSDT to memory 24 nospcr -- disable console in ACPI SPCR table as [all …]
|
D | dynamic-debug-howto.rst | 9 debug-print code to obtain additional kernel information. 22 - source filename 23 - function name 24 - line number (including ranges of line numbers) 25 - module name 26 - format string 27 - class name (as known/declared by each module) 29 NOTE: To actually get the debug-print output on the console, you may 32 Documentation/admin-guide/kernel-parameters.rst. 39 :#> head -n7 /proc/dynamic_debug/control [all …]
|
/linux-6.12.1/arch/powerpc/kernel/ |
D | secure_boot.c | 1 // SPDX-License-Identifier: GPL-2.0 14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node() 15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node() 25 bool enabled = false; in is_ppc_secureboot_enabled() local 29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled() 32 if (enabled) in is_ppc_secureboot_enabled() 36 if (!of_property_read_u32(node, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled() 37 enabled = (secureboot > 1); in is_ppc_secureboot_enabled() 41 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled() 43 return enabled; in is_ppc_secureboot_enabled() [all …]
|
D | ima_arch.c | 1 // SPDX-License-Identifier: GPL-2.0 16 * The "secure_rules" are enabled only on "secureboot" enabled systems. 23 * is not enabled. 34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems. 45 * The "secure_and_trusted_rules" contains rules for both the secure boot and 46 * trusted boot. The "template=ima-modsig" option includes the appended 50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig", 51 "measure func=MODULE_CHECK template=ima-modsig", 60 * Returns the relevant IMA arch-specific policies based on the system secure 61 * boot state.
|
/linux-6.12.1/Documentation/arch/arm64/ |
D | cpu-hotplug.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 CPUs that were not available during boot to be added to the system later. 15 CPU Hotplug on physical systems - CPUs not present at boot 16 ---------------------------------------------------------- 34 boot to discover the system wide supported features. ACPI's MADT GICC 42 CPU Hotplug on virtual systems - CPUs not enabled at boot 43 --------------------------------------------------------- 46 ever have can be described at boot. There are no power-domain considerations 63 that firmware wishes to disable either from boot (or later) should not be 64 ``enabled`` in the MADT GICC structures, but should have the ``online capable`` [all …]
|
/linux-6.12.1/mm/ |
D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 24 use-after-free). The error reports for these checks can be augmented 26 PAGE_OWNER is also selected and enabled on boot. 31 be enabled in combination with hibernation as that would result in 38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc 56 will still exist (with SYSFS enabled), it will not provide e.g. cache 65 Boot with debugging on by default. SLUB boots by default with 67 equivalent to specifying the "slab_debug" parameter on boot. 71 "slab_debug=-". 86 detect use-after-free accesses in such caches. [all …]
|
/linux-6.12.1/include/linux/habanalabs/ |
D | hl_boot_if.h | 1 /* SPDX-License-Identifier: GPL-2.0 3 * Copyright 2018-2023 HabanaLabs, Ltd. 11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */ 47 * will clear the non-relevant ones. 67 * Boot continues as usual, but keep in 89 * started, but is not ready yet - chip 94 * trust), boot authentication (chain of 137 * memories. Boot disabled until reset. 139 * CPU_BOOT_ERR0_ENABLED Error registers enabled. 204 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers [all …]
|
/linux-6.12.1/drivers/firmware/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 # see Documentation/kbuild/kconfig-language.rst. 19 provides a mechanism for inter-processor communication between SCP 41 tristate "BIOS Enhanced Disk Drive calls determine boot disk" 46 BIOS tries boot from. This information is then exported via sysfs. 48 This option is experimental and is known to fail to boot on some 58 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set 62 bool "Add firmware-provided memory map to sysfs" if EXPERT 65 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap. 69 See also Documentation/ABI/testing/sysfs-firmware-memmap. [all …]
|
/linux-6.12.1/Documentation/arch/x86/ |
D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 memory. Private memory is encrypted with the guest-specific key, while shared 20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor 36 When SEV is enabled, instruction pages and guest page tables are always treated 39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware 52 memory encryption is enabled (this only affects 57 determine if SME is enabled and/or to enable memory encryption:: 61 1 = memory encryption features are enabled 78 - Supported: 81 - Enabled: [all …]
|
/linux-6.12.1/arch/arm/mach-mvebu/ |
D | coherency_ll.S | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 7 * Gregory CLEMENT <gregory.clement@free-electrons.com> 11 * CPUs during their early boot in an SMP kernel, this why this 13 * primary CPU from C code during its boot. 23 .arch armv7-a 27 * the coherency fabric is not enabled. 31 tst r1, #CR_M @ Check MMU bit enabled 44 * MMU is enabled, use the virtual address of the coherency 57 * endian-swapped as appropriate so that the calling functions do not 85 * CPU boot, and no stack is available at this point. [all …]
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | sysfs-firmware-acpi | 6 information for firmware performance data for system boot, 10 boot: 14 loading the OS boot loader into memory. 17 launching the currently loaded OS boot loader 36 since the last full boot sequence. 38 logged since the last full boot sequence, 49 to obtain a copy of the firmware boot splash and 51 by boot splash applications in order to interact with 52 the firmware boot splash in order to avoid jarring 55 image: The image bitmap. Currently a 32-bit BMP. [all …]
|
/linux-6.12.1/arch/arm64/include/asm/ |
D | cpufeature.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 9 #include <asm/alternative-macros.h> 34 * between the values, the features are classified into 3 types - LOWER_SAFE, 80 * A @mask field set to full-1 indicates that the corresponding field 83 * A @mask field set to full-0 with the corresponding @val field set 84 * to full-0 denotes that this field has no override 86 * A @mask field set to full-0 with the corresponding @val field set 87 * to full-1 denotes that this field has an invalid override. 95 * @arm64_ftr_reg - Feature register 144 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the [all …]
|
/linux-6.12.1/tools/testing/selftests/kexec/ |
D | kexec_common_lib.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 VERBOSE="${VERBOSE:-1}" 7 IKCONFIG="/tmp/config-`uname -r`" 8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`" 13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1" 19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]" 26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]" 33 [ $VERBOSE -ne 0 ] && echo "$1" 37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID). 38 # (Based on kdump-lib.sh) [all …]
|
/linux-6.12.1/Documentation/arch/powerpc/ |
D | firmware-assisted-dump.rst | 2 Firmware-Assisted Dump 7 The goal of firmware-assisted dump is to enable the dump of 8 a crashed system, and to do so from a fully-reset system, and 12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace 14 - Fadump uses the same firmware interfaces and memory reservation model 16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore 19 - Unlike phyp dump, userspace tool does not need to refer any sysfs 21 - Unlike phyp dump, FADump allows user to release all the memory reserved 23 - Once enabled through kernel boot parameter, FADump can be 28 Comparing with kdump or other strategies, firmware-assisted [all …]
|
/linux-6.12.1/Documentation/networking/ |
D | netconsole.rst | 1 .. SPDX-License-Identifier: GPL-2.0 29 It can be used either built-in or as a module. As a built-in, 32 capture of early kernel panics, it does capture most of the boot 41 netconsole=[+][r][src-port]@[src-ip]/[<dev>],[tgt-port]@<tgt-ip>/[tgt-macaddr] 46 src-port source for UDP packets (defaults to 6665) 47 src-ip source IP to use (interface address) 49 tgt-port port for logging agent (6666) 50 tgt-ip IP address for logging agent 51 tgt-macaddr ethernet MAC address for logging agent (broadcast) 71 Built-in netconsole starts immediately after the TCP stack is [all …]
|
/linux-6.12.1/drivers/platform/mellanox/ |
D | mlxbf-bootctl.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 10 * Request that the on-chip watchdog be enabled, or disabled, after 12 * status of the on-chip watchdog. If non-zero, the argument 14 * will not be enabled after the next soft reset. Non-zero errors are 20 * Query the status which has been requested for the on-chip watchdog 27 * Request that a specific boot action be taken at the next soft 28 * reset. By default, the boot action is set by external chip pins, 29 * which are sampled on hard reset. Note that the boot action 33 * values. Non-zero errors are returned as documented below. 38 * Return the specific boot action which will be taken at the next [all …]
|
/linux-6.12.1/Documentation/admin-guide/mm/ |
D | zswap.rst | 10 dynamically allocated RAM-based memory pool. zswap basically trades CPU cycles 11 for potentially reduced swap I/O. This trade-off can also result in a 24 drastically reducing life-shortening writes. 30 Whether Zswap is enabled at the boot time depends on whether 31 the ``CONFIG_ZSWAP_DEFAULT_ON`` Kconfig option is enabled or not. 33 ``zswap.enabled=`` option, for example ``zswap.enabled=0``. 34 Zswap can also be enabled and disabled at runtime using the sysfs interface. 38 echo 1 > /sys/module/zswap/parameters/enabled 62 but it can be overridden at boot time by setting the ``zpool`` attribute, 69 means the compression ratio will always be 2:1 or worse (because of half-full [all …]
|
/linux-6.12.1/drivers/tty/serial/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 15 enabled when early_param is processed. 19 comment "Non-8250 serial port support" 45 your boot loader (lilo or loadlin) about how to pass options to the 46 kernel at boot time.) 73 your boot loader (lilo or loadlin) about how to pass options to the 74 kernel at boot time.) 85 This is enabled with "earlycon=smh" on the kernel command line. 86 The console is enabled when early_param is processed. 89 bool "Early console using RISC-V SBI" [all …]
|
/linux-6.12.1/arch/arm/boot/dts/microchip/ |
D | aks-cdu.dts | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * aks-cdu.dts - Device Tree file for AK signal CDU 9 /dts-v1/; 11 #include "ge863-pro3.dtsi" 20 clock-frequency = <32768>; 32 linux,rs485-enabled-at-boot-time; 33 rs485-rts-delay = <0 0>; 38 linux,rs485-enabled-at-boot-time; 39 rs485-rts-delay = <0 0>; 44 linux,rs485-enabled-at-boot-time; [all …]
|
/linux-6.12.1/drivers/video/fbdev/core/ |
D | fb_cmdline.c | 7 * 2001 - Documented with DocBook 8 * - Brad Douglas <brad@neruo.com> 25 * fb_get_options - get kernel boot parameters 27 * the boot parameter line 40 bool enabled; in fb_get_options() local 45 enabled = __video_get_options(name, &options, is_of); in fb_get_options() 49 enabled = false; in fb_get_options() 59 return enabled ? 0 : 1; // 0 on success, 1 otherwise in fb_get_options()
|
/linux-6.12.1/Documentation/devicetree/bindings/mfd/ |
D | tps6507x.txt | 4 - compatible: "ti,tps6507x" 5 - reg: I2C slave address 6 - regulators: This is the list of child nodes that specify the regulator 11 The regulator is matched with the regulator-compatible. 13 The valid regulator-compatible values are: 15 - xxx-supply: Input voltage supply regulator. 16 These entries are required if regulators are enabled for a device. 19 If some of input supply is powered through battery or always-on 23 vindcdc1_2-supply: VDCDC1 and VDCDC2 input. 24 vindcdc3-supply : VDCDC3 input. [all …]
|
/linux-6.12.1/security/loadpin/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 9 enabled, any files that come from other filesystems will be 11 have a root filesystem backed by a read-only device such as 12 dm-verity or a CDROM. 15 bool "Enforce LoadPin at boot" 21 If selected, LoadPin will enforce pinning at boot. If not 22 selected, it can be enabled at boot with the kernel parameter 26 bool "Allow reading files from certain other filesystems that use dm-verity" 30 that use dm-verity. LoadPin maintains a list of verity root 36 on the LoadPin securityfs entry 'dm-verity'. The ioctl
|
/linux-6.12.1/drivers/gpu/drm/i915/gt/ |
D | intel_gt_pm_debugfs.c | 1 // SPDX-License-Identifier: MIT 29 atomic_inc(>->user_wakeref); in intel_gt_pm_debugfs_forcewake_user_open() 31 if (GRAPHICS_VER(gt->i915) >= 6) in intel_gt_pm_debugfs_forcewake_user_open() 32 intel_uncore_forcewake_user_get(gt->uncore); in intel_gt_pm_debugfs_forcewake_user_open() 37 if (GRAPHICS_VER(gt->i915) >= 6) in intel_gt_pm_debugfs_forcewake_user_release() 38 intel_uncore_forcewake_user_put(gt->uncore); in intel_gt_pm_debugfs_forcewake_user_release() 40 atomic_dec(>->user_wakeref); in intel_gt_pm_debugfs_forcewake_user_release() 45 struct intel_gt *gt = inode->i_private; in forcewake_user_open() 54 struct intel_gt *gt = inode->i_private; in forcewake_user_release() 69 struct intel_gt *gt = m->private; in fw_domains_show() [all …]
|
/linux-6.12.1/arch/x86/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 bool "64-bit kernel" if "$(ARCH)" = "x86" 7 Say yes to build a 64-bit kernel - formerly known as x86_64 8 Say no to build a 32-bit kernel - formerly known as i386 13 # Options that are inherently 32-bit kernel only: 27 # Options that are inherently 64-bit kernel only: 55 # ported to 32-bit as well. ) 150 # Word-size accesses may read uninitialized data past the trailing \0 329 default "elf32-i386" if X86_32 330 default "elf64-x86-64" if X86_64 [all …]
|