Home
last modified time | relevance | path

Searched +full:boot +full:- +full:enabled (Results 1 – 25 of 1027) sorted by relevance

12345678910>>...42

/linux-6.12.1/Documentation/admin-guide/
Dkernel-parameters.rst3 The kernel's command-line parameters
12 The kernel parses parameters from the kernel command line up to "``--``";
16 Everything after "``--``" is passed as an argument to init.
32 log_buf_len=1M print-fatal-signals=1
36 log-buf-len=1M print_fatal_signals=1
38 Double-quotes can be used to protect spaces in values, e.g.::
43 ----------
52 <cpu number>-<cpu number>
57 <cpu number>,...,<cpu number>-<cpu number>
63 <cpu number>-<cpu number>:<used size>/<group size>
[all …]
Dkernel-parameters.txt5 avoid prolonged boot times. The lazy option will add
10 at once during boot.
16 force -- enable ACPI if default was off
17 on -- enable ACPI but allow fallback to DT [arm64,riscv64]
18 off -- disable ACPI if default was on
19 noirq -- do not use ACPI for IRQ routing
20 strict -- Be less tolerant of platforms that are not
22 rsdt -- prefer RSDT over (default) XSDT
23 copy_dsdt -- copy DSDT to memory
24 nospcr -- disable console in ACPI SPCR table as
[all …]
Ddynamic-debug-howto.rst9 debug-print code to obtain additional kernel information.
22 - source filename
23 - function name
24 - line number (including ranges of line numbers)
25 - module name
26 - format string
27 - class name (as known/declared by each module)
29 NOTE: To actually get the debug-print output on the console, you may
32 Documentation/admin-guide/kernel-parameters.rst.
39 :#> head -n7 /proc/dynamic_debug/control
[all …]
/linux-6.12.1/arch/powerpc/kernel/
Dsecure_boot.c1 // SPDX-License-Identifier: GPL-2.0
14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node()
15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node()
25 bool enabled = false; in is_ppc_secureboot_enabled() local
29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled()
32 if (enabled) in is_ppc_secureboot_enabled()
36 if (!of_property_read_u32(node, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled()
37 enabled = (secureboot > 1); in is_ppc_secureboot_enabled()
41 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled()
43 return enabled; in is_ppc_secureboot_enabled()
[all …]
Dima_arch.c1 // SPDX-License-Identifier: GPL-2.0
16 * The "secure_rules" are enabled only on "secureboot" enabled systems.
23 * is not enabled.
34 * The "trusted_rules" are enabled only on "trustedboot" enabled systems.
45 * The "secure_and_trusted_rules" contains rules for both the secure boot and
46 * trusted boot. The "template=ima-modsig" option includes the appended
50 "measure func=KEXEC_KERNEL_CHECK template=ima-modsig",
51 "measure func=MODULE_CHECK template=ima-modsig",
60 * Returns the relevant IMA arch-specific policies based on the system secure
61 * boot state.
/linux-6.12.1/Documentation/arch/arm64/
Dcpu-hotplug.rst1 .. SPDX-License-Identifier: GPL-2.0
10 CPUs that were not available during boot to be added to the system later.
15 CPU Hotplug on physical systems - CPUs not present at boot
16 ----------------------------------------------------------
34 boot to discover the system wide supported features. ACPI's MADT GICC
42 CPU Hotplug on virtual systems - CPUs not enabled at boot
43 ---------------------------------------------------------
46 ever have can be described at boot. There are no power-domain considerations
63 that firmware wishes to disable either from boot (or later) should not be
64 ``enabled`` in the MADT GICC structures, but should have the ``online capable``
[all …]
/linux-6.12.1/mm/
DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
56 will still exist (with SYSFS enabled), it will not provide e.g. cache
65 Boot with debugging on by default. SLUB boots by default with
67 equivalent to specifying the "slab_debug" parameter on boot.
71 "slab_debug=-".
86 detect use-after-free accesses in such caches.
[all …]
/linux-6.12.1/include/linux/habanalabs/
Dhl_boot_if.h1 /* SPDX-License-Identifier: GPL-2.0
3 * Copyright 2018-2023 HabanaLabs, Ltd.
11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */
47 * will clear the non-relevant ones.
67 * Boot continues as usual, but keep in
89 * started, but is not ready yet - chip
94 * trust), boot authentication (chain of
137 * memories. Boot disabled until reset.
139 * CPU_BOOT_ERR0_ENABLED Error registers enabled.
204 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers
[all …]
/linux-6.12.1/drivers/firmware/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 # see Documentation/kbuild/kconfig-language.rst.
19 provides a mechanism for inter-processor communication between SCP
41 tristate "BIOS Enhanced Disk Drive calls determine boot disk"
46 BIOS tries boot from. This information is then exported via sysfs.
48 This option is experimental and is known to fail to boot on some
58 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set
62 bool "Add firmware-provided memory map to sysfs" if EXPERT
65 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap.
69 See also Documentation/ABI/testing/sysfs-firmware-memmap.
[all …]
/linux-6.12.1/Documentation/arch/x86/
Damd-memory-encryption.rst1 .. SPDX-License-Identifier: GPL-2.0
19 memory. Private memory is encrypted with the guest-specific key, while shared
20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor
36 When SEV is enabled, instruction pages and guest page tables are always treated
39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware
52 memory encryption is enabled (this only affects
57 determine if SME is enabled and/or to enable memory encryption::
61 1 = memory encryption features are enabled
78 - Supported:
81 - Enabled:
[all …]
/linux-6.12.1/arch/arm/mach-mvebu/
Dcoherency_ll.S1 /* SPDX-License-Identifier: GPL-2.0-only */
7 * Gregory CLEMENT <gregory.clement@free-electrons.com>
11 * CPUs during their early boot in an SMP kernel, this why this
13 * primary CPU from C code during its boot.
23 .arch armv7-a
27 * the coherency fabric is not enabled.
31 tst r1, #CR_M @ Check MMU bit enabled
44 * MMU is enabled, use the virtual address of the coherency
57 * endian-swapped as appropriate so that the calling functions do not
85 * CPU boot, and no stack is available at this point.
[all …]
/linux-6.12.1/Documentation/ABI/testing/
Dsysfs-firmware-acpi6 information for firmware performance data for system boot,
10 boot:
14 loading the OS boot loader into memory.
17 launching the currently loaded OS boot loader
36 since the last full boot sequence.
38 logged since the last full boot sequence,
49 to obtain a copy of the firmware boot splash and
51 by boot splash applications in order to interact with
52 the firmware boot splash in order to avoid jarring
55 image: The image bitmap. Currently a 32-bit BMP.
[all …]
/linux-6.12.1/arch/arm64/include/asm/
Dcpufeature.h1 /* SPDX-License-Identifier: GPL-2.0-only */
9 #include <asm/alternative-macros.h>
34 * between the values, the features are classified into 3 types - LOWER_SAFE,
80 * A @mask field set to full-1 indicates that the corresponding field
83 * A @mask field set to full-0 with the corresponding @val field set
84 * to full-0 denotes that this field has no override
86 * A @mask field set to full-0 with the corresponding @val field set
87 * to full-1 denotes that this field has an invalid override.
95 * @arm64_ftr_reg - Feature register
144 * c) SCOPE_BOOT_CPU: Check only on the primary boot CPU to detect the
[all …]
/linux-6.12.1/tools/testing/selftests/kexec/
Dkexec_common_lib.sh2 # SPDX-License-Identifier: GPL-2.0
6 VERBOSE="${VERBOSE:-1}"
7 IKCONFIG="/tmp/config-`uname -r`"
8 KERNEL_IMAGE="/boot/vmlinuz-`uname -r`"
13 [ $VERBOSE -ne 0 ] && echo "[INFO] $1"
19 [ $VERBOSE -ne 0 ] && echo "$1 [PASS]"
26 [ $VERBOSE -ne 0 ] && echo "$1 [FAIL]"
33 [ $VERBOSE -ne 0 ] && echo "$1"
37 # Check efivar SecureBoot-$(the UUID) and SetupMode-$(the UUID).
38 # (Based on kdump-lib.sh)
[all …]
/linux-6.12.1/Documentation/arch/powerpc/
Dfirmware-assisted-dump.rst2 Firmware-Assisted Dump
7 The goal of firmware-assisted dump is to enable the dump of
8 a crashed system, and to do so from a fully-reset system, and
12 - Firmware-Assisted Dump (FADump) infrastructure is intended to replace
14 - Fadump uses the same firmware interfaces and memory reservation model
16 - Unlike phyp dump, FADump exports the memory dump through /proc/vmcore
19 - Unlike phyp dump, userspace tool does not need to refer any sysfs
21 - Unlike phyp dump, FADump allows user to release all the memory reserved
23 - Once enabled through kernel boot parameter, FADump can be
28 Comparing with kdump or other strategies, firmware-assisted
[all …]
/linux-6.12.1/Documentation/networking/
Dnetconsole.rst1 .. SPDX-License-Identifier: GPL-2.0
29 It can be used either built-in or as a module. As a built-in,
32 capture of early kernel panics, it does capture most of the boot
41 netconsole=[+][r][src-port]@[src-ip]/[<dev>],[tgt-port]@<tgt-ip>/[tgt-macaddr]
46 src-port source for UDP packets (defaults to 6665)
47 src-ip source IP to use (interface address)
49 tgt-port port for logging agent (6666)
50 tgt-ip IP address for logging agent
51 tgt-macaddr ethernet MAC address for logging agent (broadcast)
71 Built-in netconsole starts immediately after the TCP stack is
[all …]
/linux-6.12.1/drivers/platform/mellanox/
Dmlxbf-bootctl.h1 /* SPDX-License-Identifier: GPL-2.0 */
10 * Request that the on-chip watchdog be enabled, or disabled, after
12 * status of the on-chip watchdog. If non-zero, the argument
14 * will not be enabled after the next soft reset. Non-zero errors are
20 * Query the status which has been requested for the on-chip watchdog
27 * Request that a specific boot action be taken at the next soft
28 * reset. By default, the boot action is set by external chip pins,
29 * which are sampled on hard reset. Note that the boot action
33 * values. Non-zero errors are returned as documented below.
38 * Return the specific boot action which will be taken at the next
[all …]
/linux-6.12.1/Documentation/admin-guide/mm/
Dzswap.rst10 dynamically allocated RAM-based memory pool. zswap basically trades CPU cycles
11 for potentially reduced swap I/O. This trade-off can also result in a
24 drastically reducing life-shortening writes.
30 Whether Zswap is enabled at the boot time depends on whether
31 the ``CONFIG_ZSWAP_DEFAULT_ON`` Kconfig option is enabled or not.
33 ``zswap.enabled=`` option, for example ``zswap.enabled=0``.
34 Zswap can also be enabled and disabled at runtime using the sysfs interface.
38 echo 1 > /sys/module/zswap/parameters/enabled
62 but it can be overridden at boot time by setting the ``zpool`` attribute,
69 means the compression ratio will always be 2:1 or worse (because of half-full
[all …]
/linux-6.12.1/drivers/tty/serial/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
15 enabled when early_param is processed.
19 comment "Non-8250 serial port support"
45 your boot loader (lilo or loadlin) about how to pass options to the
46 kernel at boot time.)
73 your boot loader (lilo or loadlin) about how to pass options to the
74 kernel at boot time.)
85 This is enabled with "earlycon=smh" on the kernel command line.
86 The console is enabled when early_param is processed.
89 bool "Early console using RISC-V SBI"
[all …]
/linux-6.12.1/arch/arm/boot/dts/microchip/
Daks-cdu.dts1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * aks-cdu.dts - Device Tree file for AK signal CDU
9 /dts-v1/;
11 #include "ge863-pro3.dtsi"
20 clock-frequency = <32768>;
32 linux,rs485-enabled-at-boot-time;
33 rs485-rts-delay = <0 0>;
38 linux,rs485-enabled-at-boot-time;
39 rs485-rts-delay = <0 0>;
44 linux,rs485-enabled-at-boot-time;
[all …]
/linux-6.12.1/drivers/video/fbdev/core/
Dfb_cmdline.c7 * 2001 - Documented with DocBook
8 * - Brad Douglas <brad@neruo.com>
25 * fb_get_options - get kernel boot parameters
27 * the boot parameter line
40 bool enabled; in fb_get_options() local
45 enabled = __video_get_options(name, &options, is_of); in fb_get_options()
49 enabled = false; in fb_get_options()
59 return enabled ? 0 : 1; // 0 on success, 1 otherwise in fb_get_options()
/linux-6.12.1/Documentation/devicetree/bindings/mfd/
Dtps6507x.txt4 - compatible: "ti,tps6507x"
5 - reg: I2C slave address
6 - regulators: This is the list of child nodes that specify the regulator
11 The regulator is matched with the regulator-compatible.
13 The valid regulator-compatible values are:
15 - xxx-supply: Input voltage supply regulator.
16 These entries are required if regulators are enabled for a device.
19 If some of input supply is powered through battery or always-on
23 vindcdc1_2-supply: VDCDC1 and VDCDC2 input.
24 vindcdc3-supply : VDCDC3 input.
[all …]
/linux-6.12.1/security/loadpin/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
9 enabled, any files that come from other filesystems will be
11 have a root filesystem backed by a read-only device such as
12 dm-verity or a CDROM.
15 bool "Enforce LoadPin at boot"
21 If selected, LoadPin will enforce pinning at boot. If not
22 selected, it can be enabled at boot with the kernel parameter
26 bool "Allow reading files from certain other filesystems that use dm-verity"
30 that use dm-verity. LoadPin maintains a list of verity root
36 on the LoadPin securityfs entry 'dm-verity'. The ioctl
/linux-6.12.1/drivers/gpu/drm/i915/gt/
Dintel_gt_pm_debugfs.c1 // SPDX-License-Identifier: MIT
29 atomic_inc(&gt->user_wakeref); in intel_gt_pm_debugfs_forcewake_user_open()
31 if (GRAPHICS_VER(gt->i915) >= 6) in intel_gt_pm_debugfs_forcewake_user_open()
32 intel_uncore_forcewake_user_get(gt->uncore); in intel_gt_pm_debugfs_forcewake_user_open()
37 if (GRAPHICS_VER(gt->i915) >= 6) in intel_gt_pm_debugfs_forcewake_user_release()
38 intel_uncore_forcewake_user_put(gt->uncore); in intel_gt_pm_debugfs_forcewake_user_release()
40 atomic_dec(&gt->user_wakeref); in intel_gt_pm_debugfs_forcewake_user_release()
45 struct intel_gt *gt = inode->i_private; in forcewake_user_open()
54 struct intel_gt *gt = inode->i_private; in forcewake_user_release()
69 struct intel_gt *gt = m->private; in fw_domains_show()
[all …]
/linux-6.12.1/arch/x86/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
4 bool "64-bit kernel" if "$(ARCH)" = "x86"
7 Say yes to build a 64-bit kernel - formerly known as x86_64
8 Say no to build a 32-bit kernel - formerly known as i386
13 # Options that are inherently 32-bit kernel only:
27 # Options that are inherently 64-bit kernel only:
55 # ported to 32-bit as well. )
150 # Word-size accesses may read uninitialized data past the trailing \0
329 default "elf32-i386" if X86_32
330 default "elf64-x86-64" if X86_64
[all …]

12345678910>>...42