Lines Matching +full:booting +full:- +full:without +full:- +full:of
1 # SPDX-License-Identifier: GPL-2.0-only
25 Saying Y here will disable the use of efivars as a storage
34 On systems that have mixed performance classes of memory EFI
42 resource, and set aside for direct-access (device-dax) by
45 device-dax kmem facility. Say N to have the kernel treat this
83 memory before executing it. For compatibility with non-EFI loaders,
111 bootloader. If the string matches one of the boot labels
129 bool "Add support for Quark capsules with non-standard headers"
143 of going through the efivar API, because it is not trying to test the
147 interfaces readiness of the firmware.
164 devices, allowing for improved support of Apple hardware.
174 Request that the firmware clear the contents of RAM after a reboot
177 still contains secrets in RAM, booting another OS and extracting the
187 Displays the content of the Runtime Configuration Interface
204 firmware can't guarantee that the OS is IOMMU-aware, it will tear
215 and should not be enabled without testing. The kernel commandline
230 Allow loading of an ACPI SSDT overlay from an EFI variable specified
233 See Documentation/admin-guide/acpi/ssdt-overlays.rst for more
242 useful to have this default without any kernel command line parameter.
247 an issue for Real-Time kernels.
258 In order to use the secrets in the kernel, the location of the secret
261 If you say Y here, the address of the EFI secret area will be kept
270 Recent versions of the Open Virtual Machine Firmware
271 (edk2-stable202508 + newer) can write their debug log to a memory
300 SBAT section provides a way to improve SecureBoot revocations of UEFI
301 binaries by introducing a generation-based mechanism. With SBAT, older
302 UEFI binaries can be prevented from booting by bumping the minimal
305 Note: SBAT information is distribution specific, i.e. the owner of the
333 tristate "TEE-based EFI runtime variable service driver"
338 EFI variables on an RPMB or any other non-volatile medium used by