/openbmc/openbmc-test-automation/redfish/systems/ |
H A D | test_boot_devices.robot | 2 Documentation This suite test various boot types with boot source. 23 &{redfish_ipmi_enabled_map} Once=Options apply to only next boot 25 ... Disabled=Boot Flag Invalid 29 &{redfish_ipmi_target_map} Hdd=Force Boot from default Hard-Drive 31 ... Diags=Force Boot from default Hard-Drive, request Safe-Mode 32 ... Cd=Force Boot from CD/DVD 33 ... BiosSetup=Force Boot into BIOS Setup 38 &{redfish_ipmi_mode_map} Legacy=BIOS PC Compatible (legacy) boot 39 ... UEFI=BIOS EFI boot 45 Verify BMC Redfish Boot Source Override with Enabled Mode As Once [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.rst | 3 The kernel's command-line parameters 12 The kernel parses parameters from the kernel command line up to "``--``"; 16 Everything after "``--``" is passed as an argument to init. 32 log_buf_len=1M print-fatal-signals=1 36 log-buf-len=1M print_fatal_signals=1 38 Double-quotes can be used to protect spaces in values, e.g.:: 43 ---------- 52 <cpu number>-<cpu number> 57 <cpu number>,...,<cpu number>-<cpu number> 63 <cpu number>-<cpu number>:<used size>/<group size> [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier4U/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 98 "possible_values": ["Enabled", "Disabled"], 99 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Everest/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 98 "possible_values": ["Enabled", "Disabled"], 99 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier1S4U/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 98 "possible_values": ["Enabled", "Disabled"], 99 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier2U/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 98 "possible_values": ["Enabled", "Disabled"], 99 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 98 "possible_values": ["Enabled", "Disabled"], 99 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Bonnell/ |
H A D | bios_attrs.json | 9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t… 10 "display_name": "Current Firmware Boot Side (pending)" 18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this … 19 "display_name": "Current Firmware Boot Side (current)" 24 "possible_values": ["Disabled", "Enabled"], 25 "value_names": ["Disabled", "Enabled"], 26 "default_values": ["Enabled"], 54 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.", 80 "possible_values": ["Enabled", "Disabled"], 81 "value_names": ["Enabled", "Disabled"], [all …]
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | secure_boot.c | 1 // SPDX-License-Identifier: GPL-2.0 14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node() 15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node() 25 bool enabled = false; in is_ppc_secureboot_enabled() local 29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled() 32 if (enabled) in is_ppc_secureboot_enabled() 35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled() 36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled() 39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled() 41 return enabled; in is_ppc_secureboot_enabled() [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/misc/ |
H A D | phosphor-misc_git.bb | 2 HOMEPAGE = "https://github.com/openbmc/phosphor-misc" 3 LICENSE = "Apache-2.0" 8 first-boot-set-hostname \ 9 first-boot-set-mac \ 10 http-redirect-awk \ 11 usb-ctrl \ 13 PACKAGECONFIG[first-boot-set-hostname] = "-Dfirst-boot-set-hostname=enabled, -Dfirst-boot-set-hostn… 14 PACKAGECONFIG[first-boot-set-mac] = "-Dfirst-boot-set-mac=enabled, -Dfirst-boot-set-mac=disabled" 15 PACKAGECONFIG[http-redirect-awk] = "-Dhttp-redirect=enabled, -Dhttp-redirect=disabled" 16 PACKAGECONFIG[usb-ctrl] = "-Dusb-ctrl=enabled, -Dusb-ctrl=disabled" [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/ |
H A D | uefi_secureboot.py | 2 # SPDX-License-Identifier: MIT 11 Validate Secure Boot is Enabled 16 # Validate Secure Boot is enabled by checking 17 # 8be4df61-93ca-11d2-aa0d-00e098032b8c-SecureBoot. 18 # The GUID '8be4df61-93ca-11d2-aa0d-00e098032b8c' is a well-known 19 # identifier for the Secure Boot UEFI variable. By checking the value of 21 # '8be4df61-93ca-11d2-aa0d-00e098032b8c-SecureBoot', we can determine 22 # whether Secure Boot is enabled or not. This variable is set by the 23 # UEFI firmware to indicate the current Secure Boot state. If the 25 # Boot is enabled. If the variable is set to a value of '0x0' (or '0'), [all …]
|
/openbmc/u-boot/common/spl/ |
H A D | Kconfig | 25 supports MMC, NAND and YMODEM and other methods loading of U-Boot 29 bool "Pass hand-off information from SPL to U-Boot proper" 32 It is useful to be able to pass information from SPL to U-Boot 33 proper to preserve state that is known in SPL and is needed in U-Boot. 34 Enable this to locate the handoff information in U-Boot proper, early 35 in boot. It is available in gd->handoff. The state state is set up 44 This option can minilize the SPL size to compatible with AST2600-A0 45 secure boot. 48 bool "Pass hand-off information from SPL to U-Boot proper" 53 used to pass information like the size of SDRAM from SPL to U-Boot [all …]
|
/openbmc/linux/mm/ |
H A D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0-only 24 use-after-free). The error reports for these checks can be augmented 26 PAGE_OWNER is also selected and enabled on boot. 31 be enabled in combination with hibernation as that would result in 38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc 54 memory. This can make kmalloc/kfree-intensive workloads much slower. 64 will still exist (with SYSFS enabled), it will not provide e.g. cache 73 Boot with debugging on by default. SLUB boots by default with 75 equivalent to specifying the "slub_debug" parameter on boot. 79 "slub_debug=-". [all …]
|
/openbmc/linux/drivers/firmware/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 # see Documentation/kbuild/kconfig-language.rst. 19 provides a mechanism for inter-processor communication between SCP 38 enabled or disabled via the SCP firmware 50 tristate "BIOS Enhanced Disk Drive calls determine boot disk" 55 BIOS tries boot from. This information is then exported via sysfs. 57 This option is experimental and is known to fail to boot on some 67 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set 71 bool "Add firmware-provided memory map to sysfs" if EXPERT 74 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap. [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SecureBoot.v1_1_2.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 31 "description": "The available OEM-specific actions for this resource.", 32 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 39 "description": "The available OEM-specific actions for this resource.", 40 …"longDescription": "This type shall contain the available OEM-specific actions for this resource.", 42 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 60 "description": "This action resets the UEFI Secure Boot keys.", 61 …Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boot key databa… [all …]
|
H A D | BootOption.v1_0_6.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 28 "description": "The available OEM-specific actions for this resource.", 29 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 36 …"description": "The `BootOption` schema reports information about a single boot option in a system… 37 … "longDescription": "This resource shall represent a single boot option within a system.", 39 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 54 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context" 57 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/etag" [all …]
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 memory. Private memory is encrypted with the guest-specific key, while shared 20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor 36 When SEV is enabled, instruction pages and guest page tables are always treated 39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware 52 memory encryption is enabled (this only affects 57 determine if SME is enabled and/or to enable memory encryption:: 61 1 = memory encryption features are enabled 78 - Supported: 81 - Enabled: [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | state_map.py | 6 - Defines Valid states of the system 50 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.Unspecified", 60 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.Unspecified", 70 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.MotherboardInit", 80 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.OSStart", 90 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.OSStart", 99 "Enabled", 108 "Enabled", 117 "Enabled", 119 "Enabled", [all …]
|
/openbmc/linux/drivers/accel/habanalabs/include/common/ |
H A D | hl_boot_if.h | 1 /* SPDX-License-Identifier: GPL-2.0 3 * Copyright 2018-2020 HabanaLabs, Ltd. 11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */ 47 * will clear the non-relevant ones. 68 * Boot continues as usual, but keep in 90 * started, but is not ready yet - chip 95 * trust), boot authentication (chain of 138 * memories. Boot disabled until reset. 140 * CPU_BOOT_ERR0_ENABLED Error registers enabled. 203 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/Service/ |
H A D | README.md | 6 phosphor-ipmi-net, bmcweb, obmc-console etc in the system, instead of directly 11 - "bmcweb" 12 - "obmc-console"` 13 - "phosphor-ipmi-kcs" 14 - "phosphor-ipmi-net" 15 - "obmc-ikvm" 19 Service manager daemon will create D-Bus objects for configurable services in 21 each instance of the service there will be a D-Bus object 22 `/xyz/openbmc_project/control/service/<service-name>`. For example, if there are 23 two instances of `phosphor-ipmi-net` then there will be two D-Bus objects [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/ |
H A D | SecureBoot.interface.yaml | 2 UEFI Secure Boot information and represents properties for managing the UEFI 3 Secure Boot functionality of a system. 6 - name: CurrentBoot 9 The UEFI Secure Boot state during the current boot cycle. 12 - name: PendingEnable 15 An indication of whether the UEFI Secure Boot takes effect on next 16 boot. 18 - name: Mode 21 The current UEFI Secure Boot Mode. 25 - name: CurrentBootType [all …]
|
/openbmc/u-boot/common/ |
H A D | Kconfig | 1 menu "Boot timing" 4 bool "Boot timing and reporting" 6 Enable recording of boot time while booting. To use it, insert 22 bool "Boot timing and reported in SPL" 25 Enable recording of boot time in SPL. To make this visible to U-Boot 27 information when SPL finishes and load it when U-Boot proper starts 31 bool "Boot timing and reported in TPL" 34 Enable recording of boot time in SPL. To make this visible to U-Boot 36 information when TPL finishes and load it when U-Boot proper starts 40 bool "Display a detailed boot timing report before booting the OS" [all …]
|
/openbmc/u-boot/dts/ |
H A D | Kconfig | 26 bool "Run-time configuration via Device Tree" 29 This feature provides for run-time configuration of U-Boot 33 bool "Board-specific manipulation of Device Tree" 36 U-Boot's device tree (e.g. to delete device from it). This option 37 make the Device Tree writeable and provides a board-specific 38 "board_fix_fdt" callback (called during pre-relocation time), which 40 modified copy is subsequently used by U-Boot after relocation. 43 bool "Enable run-time configuration via Device Tree in SPL" 46 Some boards use device tree in U-Boot but only have 4KB of SRAM 48 allow such boards to be supported by U-Boot SPL. [all …]
|
/openbmc/u-boot/include/ |
H A D | spl.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 11 /* Platform-specific defines */ 16 /* Value in r0 indicates we booted from U-Boot */ 19 /* Boot type */ 26 * u_boot_first_phase() - check if this is the first U-Boot phase 28 * U-Boot has up to three phases: TPL, SPL and U-Boot proper. Depending on the 30 * phase of U-Boot or not. If there is no SPL, then this is U-Boot proper. If 34 * @returns true if this is the first phase of U-Boot 103 * We need to know the position of U-Boot in memory so we can jump to it. We 104 * allow any U-Boot binary to be used (u-boot.bin, u-boot-nodtb.bin, [all …]
|
/openbmc/u-boot/doc/imx/habv4/guides/ |
H A D | encrypted_boot.txt | 1 1. Setup U-Boot Image for Encrypted Boot 2 ---------------------------------------- 3 An authenticated U-Boot image is used as starting point for 4 Encrypted Boot. The image is encrypted by i.MX Code Signing 6 u-boot-dtb.imx with the encrypted data. The Initial Vector Table, 7 DCD, and Boot data, remains in plaintext. 12 which needs to be appended to the U-Boot image and specified in 15 The DEK blob is generated by an authenticated U-Boot image with 16 the dek_blob cmd enabled. The image used for DEK blob generation 17 needs to have the following configurations enabled in Kconfig: [all …]
|