Home
last modified time | relevance | path

Searched +full:boot +full:- +full:enabled (Results 1 – 25 of 1047) sorted by relevance

12345678910>>...42

/openbmc/openbmc-test-automation/redfish/systems/
H A Dtest_boot_devices.robot2 Documentation This suite test various boot types with boot source.
23 &{redfish_ipmi_enabled_map} Once=Options apply to only next boot
25 ... Disabled=Boot Flag Invalid
29 &{redfish_ipmi_target_map} Hdd=Force Boot from default Hard-Drive
31 ... Diags=Force Boot from default Hard-Drive, request Safe-Mode
32 ... Cd=Force Boot from CD/DVD
33 ... BiosSetup=Force Boot into BIOS Setup
38 &{redfish_ipmi_mode_map} Legacy=BIOS PC Compatible (legacy) boot
39 ... UEFI=BIOS EFI boot
45 Verify BMC Redfish Boot Source Override with Enabled Mode As Once
[all …]
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.rst3 The kernel's command-line parameters
12 The kernel parses parameters from the kernel command line up to "``--``";
16 Everything after "``--``" is passed as an argument to init.
32 log_buf_len=1M print-fatal-signals=1
36 log-buf-len=1M print_fatal_signals=1
38 Double-quotes can be used to protect spaces in values, e.g.::
43 ----------
52 <cpu number>-<cpu number>
57 <cpu number>,...,<cpu number>-<cpu number>
63 <cpu number>-<cpu number>:<used size>/<group size>
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier4U/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
98 "possible_values": ["Enabled", "Disabled"],
99 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Everest/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
98 "possible_values": ["Enabled", "Disabled"],
99 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier1S4U/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
98 "possible_values": ["Enabled", "Disabled"],
99 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Rainier2U/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
98 "possible_values": ["Enabled", "Disabled"],
99 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
72 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
98 "possible_values": ["Enabled", "Disabled"],
99 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/pldm/oem/ibm/configurations/bios/com.ibm.Hardware.Chassis.Model.Bonnell/
H A Dbios_attrs.json9 … the next boot side to the host, i.e. Temp or Perm. Host can set/query this attribute at anytime t…
10 "display_name": "Current Firmware Boot Side (pending)"
18 …"help_text": "Specifies the current boot side to the host, i.e. Temp or Perm. Host can query this …
19 "display_name": "Current Firmware Boot Side (current)"
24 "possible_values": ["Disabled", "Enabled"],
25 "value_names": ["Disabled", "Enabled"],
26 "default_values": ["Enabled"],
54 "help_text": "Tells the host boot fw which type of hypervisor will be loaded.",
80 "possible_values": ["Enabled", "Disabled"],
81 "value_names": ["Enabled", "Disabled"],
[all …]
/openbmc/linux/arch/powerpc/kernel/
H A Dsecure_boot.c1 // SPDX-License-Identifier: GPL-2.0
14 { .compatible = "ibm,secureboot-v1", }, in get_ppc_fw_sb_node()
15 { .compatible = "ibm,secureboot-v2", }, in get_ppc_fw_sb_node()
25 bool enabled = false; in is_ppc_secureboot_enabled() local
29 enabled = of_property_read_bool(node, "os-secureboot-enforcing"); in is_ppc_secureboot_enabled()
32 if (enabled) in is_ppc_secureboot_enabled()
35 if (!of_property_read_u32(of_root, "ibm,secure-boot", &secureboot)) in is_ppc_secureboot_enabled()
36 enabled = (secureboot > 1); in is_ppc_secureboot_enabled()
39 pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); in is_ppc_secureboot_enabled()
41 return enabled; in is_ppc_secureboot_enabled()
[all …]
/openbmc/openbmc/meta-phosphor/recipes-phosphor/misc/
H A Dphosphor-misc_git.bb2 HOMEPAGE = "https://github.com/openbmc/phosphor-misc"
3 LICENSE = "Apache-2.0"
8 first-boot-set-hostname \
9 first-boot-set-mac \
10 http-redirect-awk \
11 usb-ctrl \
13 PACKAGECONFIG[first-boot-set-hostname] = "-Dfirst-boot-set-hostname=enabled, -Dfirst-boot-set-hostn…
14 PACKAGECONFIG[first-boot-set-mac] = "-Dfirst-boot-set-mac=enabled, -Dfirst-boot-set-mac=disabled"
15 PACKAGECONFIG[http-redirect-awk] = "-Dhttp-redirect=enabled, -Dhttp-redirect=disabled"
16 PACKAGECONFIG[usb-ctrl] = "-Dusb-ctrl=enabled, -Dusb-ctrl=disabled"
[all …]
/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/
H A Duefi_secureboot.py2 # SPDX-License-Identifier: MIT
11 Validate Secure Boot is Enabled
16 # Validate Secure Boot is enabled by checking
17 # 8be4df61-93ca-11d2-aa0d-00e098032b8c-SecureBoot.
18 # The GUID '8be4df61-93ca-11d2-aa0d-00e098032b8c' is a well-known
19 # identifier for the Secure Boot UEFI variable. By checking the value of
21 # '8be4df61-93ca-11d2-aa0d-00e098032b8c-SecureBoot', we can determine
22 # whether Secure Boot is enabled or not. This variable is set by the
23 # UEFI firmware to indicate the current Secure Boot state. If the
25 # Boot is enabled. If the variable is set to a value of '0x0' (or '0'),
[all …]
/openbmc/u-boot/common/spl/
H A DKconfig25 supports MMC, NAND and YMODEM and other methods loading of U-Boot
29 bool "Pass hand-off information from SPL to U-Boot proper"
32 It is useful to be able to pass information from SPL to U-Boot
33 proper to preserve state that is known in SPL and is needed in U-Boot.
34 Enable this to locate the handoff information in U-Boot proper, early
35 in boot. It is available in gd->handoff. The state state is set up
44 This option can minilize the SPL size to compatible with AST2600-A0
45 secure boot.
48 bool "Pass hand-off information from SPL to U-Boot proper"
53 used to pass information like the size of SDRAM from SPL to U-Boot
[all …]
/openbmc/linux/mm/
H A DKconfig.debug1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
54 memory. This can make kmalloc/kfree-intensive workloads much slower.
64 will still exist (with SYSFS enabled), it will not provide e.g. cache
73 Boot with debugging on by default. SLUB boots by default with
75 equivalent to specifying the "slub_debug" parameter on boot.
79 "slub_debug=-".
[all …]
/openbmc/linux/drivers/firmware/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 # see Documentation/kbuild/kconfig-language.rst.
19 provides a mechanism for inter-processor communication between SCP
38 enabled or disabled via the SCP firmware
50 tristate "BIOS Enhanced Disk Drive calls determine boot disk"
55 BIOS tries boot from. This information is then exported via sysfs.
57 This option is experimental and is known to fail to boot on some
67 kernel. Say N if you want EDD enabled by default. EDD can be dynamically set
71 bool "Add firmware-provided memory map to sysfs" if EXPERT
74 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap.
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSecureBoot.v1_1_2.json4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json",
5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or…
12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
31 "description": "The available OEM-specific actions for this resource.",
32 …"longDescription": "This property shall contain the available OEM-specific actions for this resour…
39 "description": "The available OEM-specific actions for this resource.",
40 …"longDescription": "This type shall contain the available OEM-specific actions for this resource.",
42 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
60 "description": "This action resets the UEFI Secure Boot keys.",
61Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boot key databa…
[all …]
H A DBootOption.v1_0_6.json4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json",
5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or…
12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
28 "description": "The available OEM-specific actions for this resource.",
29 …"longDescription": "This property shall contain the available OEM-specific actions for this resour…
36 …"description": "The `BootOption` schema reports information about a single boot option in a system…
37 … "longDescription": "This resource shall represent a single boot option within a system.",
39 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
54 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context"
57 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/etag"
[all …]
/openbmc/linux/Documentation/arch/x86/
H A Damd-memory-encryption.rst1 .. SPDX-License-Identifier: GPL-2.0
19 memory. Private memory is encrypted with the guest-specific key, while shared
20 memory may be encrypted with hypervisor key. When SME is enabled, the hypervisor
36 When SEV is enabled, instruction pages and guest page tables are always treated
39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware
52 memory encryption is enabled (this only affects
57 determine if SME is enabled and/or to enable memory encryption::
61 1 = memory encryption features are enabled
78 - Supported:
81 - Enabled:
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dstate_map.py6 - Defines Valid states of the system
50 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.Unspecified",
60 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.Unspecified",
70 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.MotherboardInit",
80 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.OSStart",
90 "xyz.openbmc_project.State.Boot.Progress.ProgressStages.OSStart",
99 "Enabled",
108 "Enabled",
117 "Enabled",
119 "Enabled",
[all …]
/openbmc/linux/drivers/accel/habanalabs/include/common/
H A Dhl_boot_if.h1 /* SPDX-License-Identifier: GPL-2.0
3 * Copyright 2018-2020 HabanaLabs, Ltd.
11 #define LKD_HARD_RESET_MAGIC 0xED7BD694 /* deprecated - do not use */
47 * will clear the non-relevant ones.
68 * Boot continues as usual, but keep in
90 * started, but is not ready yet - chip
95 * trust), boot authentication (chain of
138 * memories. Boot disabled until reset.
140 * CPU_BOOT_ERR0_ENABLED Error registers enabled.
203 * BOOT DEVICE STATUS bits in BOOT_DEVICE_STS registers
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/Service/
H A DREADME.md6 phosphor-ipmi-net, bmcweb, obmc-console etc in the system, instead of directly
11 - "bmcweb"
12 - "obmc-console"`
13 - "phosphor-ipmi-kcs"
14 - "phosphor-ipmi-net"
15 - "obmc-ikvm"
19 Service manager daemon will create D-Bus objects for configurable services in
21 each instance of the service there will be a D-Bus object
22 `/xyz/openbmc_project/control/service/<service-name>`. For example, if there are
23 two instances of `phosphor-ipmi-net` then there will be two D-Bus objects
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/
H A DSecureBoot.interface.yaml2 UEFI Secure Boot information and represents properties for managing the UEFI
3 Secure Boot functionality of a system.
6 - name: CurrentBoot
9 The UEFI Secure Boot state during the current boot cycle.
12 - name: PendingEnable
15 An indication of whether the UEFI Secure Boot takes effect on next
16 boot.
18 - name: Mode
21 The current UEFI Secure Boot Mode.
25 - name: CurrentBootType
[all …]
/openbmc/u-boot/common/
H A DKconfig1 menu "Boot timing"
4 bool "Boot timing and reporting"
6 Enable recording of boot time while booting. To use it, insert
22 bool "Boot timing and reported in SPL"
25 Enable recording of boot time in SPL. To make this visible to U-Boot
27 information when SPL finishes and load it when U-Boot proper starts
31 bool "Boot timing and reported in TPL"
34 Enable recording of boot time in SPL. To make this visible to U-Boot
36 information when TPL finishes and load it when U-Boot proper starts
40 bool "Display a detailed boot timing report before booting the OS"
[all …]
/openbmc/u-boot/dts/
H A DKconfig26 bool "Run-time configuration via Device Tree"
29 This feature provides for run-time configuration of U-Boot
33 bool "Board-specific manipulation of Device Tree"
36 U-Boot's device tree (e.g. to delete device from it). This option
37 make the Device Tree writeable and provides a board-specific
38 "board_fix_fdt" callback (called during pre-relocation time), which
40 modified copy is subsequently used by U-Boot after relocation.
43 bool "Enable run-time configuration via Device Tree in SPL"
46 Some boards use device tree in U-Boot but only have 4KB of SRAM
48 allow such boards to be supported by U-Boot SPL.
[all …]
/openbmc/u-boot/include/
H A Dspl.h1 /* SPDX-License-Identifier: GPL-2.0+ */
11 /* Platform-specific defines */
16 /* Value in r0 indicates we booted from U-Boot */
19 /* Boot type */
26 * u_boot_first_phase() - check if this is the first U-Boot phase
28 * U-Boot has up to three phases: TPL, SPL and U-Boot proper. Depending on the
30 * phase of U-Boot or not. If there is no SPL, then this is U-Boot proper. If
34 * @returns true if this is the first phase of U-Boot
103 * We need to know the position of U-Boot in memory so we can jump to it. We
104 * allow any U-Boot binary to be used (u-boot.bin, u-boot-nodtb.bin,
[all …]
/openbmc/u-boot/doc/imx/habv4/guides/
H A Dencrypted_boot.txt1 1. Setup U-Boot Image for Encrypted Boot
2 ----------------------------------------
3 An authenticated U-Boot image is used as starting point for
4 Encrypted Boot. The image is encrypted by i.MX Code Signing
6 u-boot-dtb.imx with the encrypted data. The Initial Vector Table,
7 DCD, and Boot data, remains in plaintext.
12 which needs to be appended to the U-Boot image and specified in
15 The DEK blob is generated by an authenticated U-Boot image with
16 the dek_blob cmd enabled. The image used for DEK blob generation
17 needs to have the following configurations enabled in Kconfig:
[all …]

12345678910>>...42